Page 1047 - Cloud computing: From paradigm to operation
P. 1047
Security 7
Bibliography
[b-ITU-T E.409] Recommendation ITU-T E.409 (2004), Incident organization and security
incident handling: Guidelines for telecommunication organizations.
[b-ITU-T X.810] Recommendation ITU-T X.810 (1995) | ISO/IEC 10181-1:1996, Information
technology – Open Systems Interconnection – Security frameworks for open
systems: Overview.
[b-ITU-T X.1601] Recommendation ITU-T X.1601 (2015), Security framework for cloud
computing.
[b-ITU-T Y.3500] Recommendation ITU-T Y.3500 (2014) | ISO/IEC 17788:2014, Information
technology – Cloud computing – Overview and vocabulary.
[b-ITU-T Y.3510] Recommendation ITU-T Y.3510 (2016), Cloud computing infrastructure
requirements.
[b-ISO/IEC DIS 19086-1] ISO/IEC DIS 19086-1: 2016, Information technology – Cloud computing –
Service level agreement (SLA) framework and technology – Part 1: Overview
and concepts.
[b-ISO/IEC 20000-1] ISO/IEC 20000-1:2011, Information technology – Service management –
Part 1: Service management system requirements.
[b-ISO/IEC 27000] ISO/IEC 27000:2012, Information technology – Security techniques –
Information security management systems – Overview and vocabulary.
[b-ISO/IEC DIS 27017] ISO/IEC DIS 27017:2015 , Information technology – Security techniques –
Code of practice for information security controls based on ISO/IEC 27002
for cloud services.
[b-ISO 27729] ISO 27729:2012, Information and documentation – International standard
name identifier (ISNI)
[b-NIST-SP-800-30] NIST Special Publication 800-30 Rev. 1 (2012), Guide for Conducting Risk
Assessments.
1039