Page 154 - Big data - Concept and application for telecommunications
P. 154
4 Big data - Concept and application for telecommunications
Bibliography
[b-ITU-T E.409] Recommendation ITU-T E.409 (2004), Incident organization and security incident
handling: Guidelines for telecommunication organizations.
[b-ITU-T X.810] Recommendation ITU-T X.810 (1995) | ISO/IEC 10181-1:1996, Information technology
– Open Systems Interconnection – Security frameworks for open systems: Overview.
[b-ITU-T Y.3500] Recommendation ITU-T Y.3500 (2014) | ISO/IEC 17788:2014, Information technology
– Cloud Computing – Overview and vocabulary.
[b-ITU-T Y.3502] Recommendation ITU-T Y.3502 (2014) | ISO/IEC 17789:2014, Information technology
– Cloud Computing – Reference architecture.
[b-ISO/IEC 19440] ISO/IEC 19440:2007, Enterprise integration – Constructs for enterprise modelling.
[b-ISO/IEC 20000-1] ISO/IEC 20000-1:2011, Information technology – Service management – Part 1: Service
management system requirements.
[b-ISO/IEC 27000] ISO/IEC 27000:2012, Information technology – Security techniques – Information
security management systems – Overview and vocabulary.
[b-ISO/IEC 27002] ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice
for information security management.
[b-ISO/IEC 27005] ISO/IEC 27005:2011, Information technology – Security techniques – Information
security risk management.
[b-ISO/IEC 27729] ISO/IEC 27729:2012, Information and documentation – International standard name
identifier (ISNI).
[b-ISO/IEC 28000] ISO/IEC 28000:2007, Specification for security management systems for the supply
chain.
[b-ISO/IEC 29100] ISO/IEC 29100:2011, Information technology – Security techniques – Privacy
framework.
[b-NIST-SP-800-30] NIST Special Publication 800-30 (2012), Guide for Conducting Risk Assessments.
[b-NIST-SP-800-53] NIST Special Publication 800-53 Rev.3 (2009), Recommended Security Controls for
Federal Information Systems and Organizations.
[b-NIST-SP-800-125] NIST Special Publication 800-125 (2011), Guide to Security for Full Virtualization
Technologies.
[b-NIST-SP-800-145] NIST Special Publication 800-145 (2011), The NIST Definition of Cloud Computing.
[b-CSA Matrix] CSA (2013), Cloud Controls Matrix, Cloud Security Alliance.
[b-key definition] Key definitions of the Data Protection Act, Information Commissioners Office
<http://www.ico.gov.uk/for_organisations/data_protection/the_guide/key_definitions.aspx>
146 Security, privacy and data protection