Page 994 - Cloud computing: From paradigm to operation
P. 994

7                                                     Security


                                                     Bibliography




            [b-ITU-T E.409]        Recommendation ITU-T E.409 (2004), Incident organization and security incident
                                   handling: Guidelines for telecommunication organizations.
            [b-ITU-T X.810]        Recommendation ITU-T X.810 (1995) | ISO/IEC 10181-1:1996, Information
                                   technology – Open Systems Interconnection – Security frameworks for open
                                   systems: Overview.

            [b-ITU-T Y.3500]       Recommendation ITU-T Y.3500 (2014) | ISO/IEC 17788:2014, Information
                                   technology – Cloud Computing – Overview and vocabulary.

            [b-ITU-T Y.3502]       Recommendation ITU-T Y.3502 (2014) | ISO/IEC 17789:2014, Information
                                   technology – Cloud Computing – Reference architecture.
            [b-ISO/IEC 19440]      ISO/IEC 19440:2007, Enterprise integration – Constructs for enterprise modelling.

            [b-ISO/IEC 20000-1]    ISO/IEC 20000-1:2011, Information technology – Service management – Part 1:
                                   Service management system requirements.

            [b-ISO/IEC 27000]      ISO/IEC 27000:2012, Information technology – Security techniques – Information
                                   security management systems – Overview and vocabulary.

            [b-ISO/IEC 27002]      ISO/IEC 27002:2005, Information technology – Security techniques – Code of
                                   practice for information security management.

            [b-ISO/IEC 27005]      ISO/IEC 27005:2011, Information technology – Security techniques – Information
                                   security risk management.
            [b-ISO/IEC 27729]      ISO/IEC 27729:2012, Information and documentation – International standard
                                   name identifier (ISNI).
            [b-ISO/IEC 28000]      ISO/IEC 28000:2007, Specification for security management systems for the supply
                                   chain.
            [b-ISO/IEC 29100]      ISO/IEC 29100:2011, Information technology – Security techniques – Privacy
                                   framework.
            [b-NIST-SP-800-30]     NIST Special Publication 800-30 (2012), Guide for Conducting Risk Assessments.

            [b-NIST-SP-800-53]     NIST Special Publication 800-53 Rev.3 (2009), Recommended Security Controls for
                                   Federal Information Systems and Organizations.

            [b-NIST-SP-800-125]    NIST Special Publication 800-125 (2011), Guide to Security for Full Virtualization
                                   Technologies.

            [b-NIST-SP-800-145]    NIST Special Publication 800-145 (2011), The NIST Definition of Cloud Computing.
            [b-CSA Matrix]         CSA (2013), Cloud Controls Matrix, Cloud Security Alliance.

            [b-key definition]     Key definitions of the Data Protection Act, Information Commissioners Office
                                   <http://www.ico.gov.uk/for_organisations/data_protection/the_guide/key_de
                                   finitions.aspx>















            986
   989   990   991   992   993   994   995   996   997   998   999