Page 1011 - Cloud computing: From paradigm to operation
P. 1011

Security                                                   7


                                                     Bibliography



            [b-ITU-T E.409]         Recommendation ITU-T E.409 (2004), Incident organization and security incident
                                    handling: Guidelines for telecommunication organizations.

            [b-ITU-T X.810]         Recommendation ITU-T X.810 (1995), Information technology – Open System
                                    Interconnection – Security frameworks for open system: Overview.

            [b-ITU-T X.1601]        Recommendation ITU-T X.1601 (2015), Security framework for cloud computing.
            [b-ITU-T Y.3500]        Recommendation ITU-T Y.3500 (2014), Information technology – Cloud
                                    computing – Overview and vocabulary.
            [b-ITU-T Y.3502]        Recommendation ITU-T Y.3502 (2014), Information technology – Cloud
                                    computing – Reference architecture.

            [b-ISO/IEC 19440]       ISO/IEC 19440 (2007), Enterprise integration – Constructs for enterprise
                                    modelling.

            [b-ISO/IEC 19944]       ISO/IEC 19944 (2016), Information technology – Cloud services and devices: data
                                    flow, data categories and data use.

            [b-ISO/IEC 20000-1]     ISO/IEC 20000-1 (2011), Information technology – Service management – Part 1:
                                    Service management system requirements.

            [b-ISO/IEC 27000]       ISO/IEC 27000 (2016), Information technology –Security techniques –
                                    Information security management systems – Overview and vocabulary.
            [b-ISO/IEC 27729]       ISO/IEC 27729 (2012), Information and documentation – International standard
                                    name identifier (ISNI).
            [b-ISO/IEC 29100]       ISO/IEC 29100 (2011), Information technology –Security techniques –Privacy
                                    framework.
            [b-NIST-SP-800-30]      NIST Special Publication 800-30 (2012), Guide for Conducting Risk Assessments.

            [b-NIST-SP-800-53]      NIST Special Publication 800-53 Rev. 3 (2013), Recommended Security Controls
                                    for Federal Information Systems and Organizations.

            [b-NIST-SP-800-125]     NIST Special Publication 800-125 (2011), Guide to Security for Full Virtualization
                                    Technologies.

            [b-NIST-SP-800-145]     NIST Special Publication 800-145 (2011), The NIST Definition of Cloud Computing.






























                                                                                                        1003
   1006   1007   1008   1009   1010   1011   1012   1013   1014   1015   1016