Page 154 - Big data - Concept and application for telecommunications
P. 154

4                                Big data - Concept and application for telecommunications



                                                     Bibliography




            [b-ITU-T E.409]     Recommendation  ITU-T  E.409  (2004),  Incident  organization  and  security  incident
                                handling: Guidelines for telecommunication organizations.
            [b-ITU-T X.810]     Recommendation ITU-T X.810 (1995) | ISO/IEC 10181-1:1996, Information technology
                                – Open Systems Interconnection – Security frameworks for open systems: Overview.
            [b-ITU-T Y.3500]     Recommendation ITU-T Y.3500 (2014) | ISO/IEC 17788:2014, Information technology
                                – Cloud Computing – Overview and vocabulary.
            [b-ITU-T Y.3502]     Recommendation ITU-T Y.3502 (2014) | ISO/IEC 17789:2014, Information technology
                                – Cloud Computing – Reference architecture.

            [b-ISO/IEC 19440]   ISO/IEC 19440:2007, Enterprise integration – Constructs for enterprise modelling.
            [b-ISO/IEC 20000-1]  ISO/IEC 20000-1:2011, Information technology – Service management – Part 1: Service
                                management system requirements.
            [b-ISO/IEC 27000]   ISO/IEC  27000:2012,  Information  technology  –  Security  techniques  –  Information
                                security management systems – Overview and vocabulary.
            [b-ISO/IEC 27002]   ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice
                                for information security management.
            [b-ISO/IEC 27005]   ISO/IEC  27005:2011,  Information  technology  –  Security  techniques  –  Information
                                security risk management.

            [b-ISO/IEC 27729]    ISO/IEC 27729:2012, Information and documentation – International standard name
                                identifier (ISNI).

            [b-ISO/IEC 28000]   ISO/IEC  28000:2007,  Specification  for  security  management  systems  for  the  supply
                                chain.

            [b-ISO/IEC 29100]   ISO/IEC  29100:2011,  Information  technology  –  Security  techniques  –  Privacy
                                framework.

            [b-NIST-SP-800-30]   NIST Special Publication 800-30 (2012), Guide for Conducting Risk Assessments.
            [b-NIST-SP-800-53]   NIST  Special  Publication  800-53  Rev.3  (2009),  Recommended  Security  Controls  for
                                Federal Information Systems and Organizations.
            [b-NIST-SP-800-125]  NIST  Special  Publication  800-125  (2011),  Guide  to  Security  for  Full  Virtualization
                                Technologies.
            [b-NIST-SP-800-145]  NIST Special Publication 800-145 (2011), The NIST Definition of Cloud Computing.

            [b-CSA Matrix]      CSA (2013), Cloud Controls Matrix, Cloud Security Alliance.
            [b-key definition]    Key  definitions  of  the  Data  Protection  Act,  Information  Commissioners  Office
                                <http://www.ico.gov.uk/for_organisations/data_protection/the_guide/key_definitions.aspx>




















            146      Security, privacy and data protection
   149   150   151   152   153   154   155   156   157   158   159