• Corpus ID: 1935867

Security and Compliance Testing Strategies for Cloud Computing Dr

@inproceedings{Dasgupta2012SecurityAC,
  title={Security and Compliance Testing Strategies for Cloud Computing Dr},
  author={Dipankar Dasgupta and Durdana Naseem},
  year={2012}
}
Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While different sectors are adopting the cloud for their IT need, they are also very concern about data security (both in rest and in motion) and various… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 36 REFERENCES
The Role of Requirement Engineering in Software Development Life Cycle
The Requirement Engineering (RE) is the most important phase of the software development life cycle (SDLC). This phase is used to translate the imprecise, incomplete needs and wishes of the potential
The New Software Testing Standard
TLDR
Progress on the development of ISO/IEC 29119, which is now due for publication in 2012, and the challenges with creating a generic testing standard that is applicable to all organizations and all types of project are described.
IT governance for enterprise resource planning supported by the DeLone-McLean model of information systems success
I investigated the role of IT governance in driving the success of ERP projects. The tool for assessing ERP value was a comprehensive, multivariate and validated model adapted from the widely used
Quality Evaluation of Object Oriented Visual Models in Unified Software Development Process
TLDR
The verification of the process of modeling in object oriented paradigm and the validation of the models are investigated, which makes certain that the precise models are worked on to yield correct product from quality point of view.
Tracking down software bugs using automatic anomaly detection
  • S. Hangal, M. Lam
  • Proceedings of the 24th International Conference on Software Engineering. ICSE 2002
  • 2002
Introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and identifying their root causes. By instrumenting a program and observing its behavior as
Information systems leadership
TLDR
This essay discusses the distinctive aspects of IS Leadership, identifies the dominant themes in prior IS Leadership research, and introduces five papers on IS Leadership in this issue.
Systematic Software Testing
TLDR
The Testing Process: Analysis and Design, Implementation and Test Execution, and Improving the Testing Process.
Rigorous System Design: The BIP Approach
TLDR
This paper introduces a rigorous design flow based on the BIP (Behavior, Interaction, Priority) component framework that relies on several, tool-supported, source-to-source transformations allowing to progressively and correctly transform high level application software towards efficient implementations for specific platforms.
Leading Virtual Teams
Executive Overview Virtual teams, whose members are geographically dispersed and cross-functional yet work on highly interdependent tasks, present unique leadership challenges. Based on our
How leaders influence organizational effectiveness
Abstract The flexible leadership theory explains how top executives and other leaders can influence the financial performance of a business organization. Three key determinants of financial
...
1
2
3
4
...