End-to-End Governance Strategies for Secure Multi-Domain Cloud Analytics
Abstract
Full Text:
PDFReferences
Abraham, R., & Ahronovitz, S. (2019). Data governance and compliance in cloud environments: Challenges and best practices. Journal of Cloud Computing, 8(1), 1–15.
Hughes, G., & Archer, J. E. (2013). Governance, risk, and compliance in cloud environments. Information Security Journal: A Global Perspective, 22(3), 102–109.
Hummer, W., Leitner, P., Inzinger, C., & Dustdar, S. (2014). Dynamic authorization and risk-aware access control for cloud services. Proceedings of the IEEE International Conference on Cloud Engineering, 221–230.
Otto, B. (2011). A morphology of the organization of data governance. Proceedings of the 19th European Conference on Information Systems (ECIS), 1–12.
Pearson, S. (2013). Privacy, security, and trust in cloud computing. In S. Gutwirth et al. (Eds.), European Data Protection: Coming of Age (pp. 441–456). Springer.
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2016). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.
Shiravi, A., Shiravi, H., & Ghorbani, A. A. (2012). A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 18(8), 1313–1329.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.
Wende, K. (2007). A model for data governance: Organizing accountabilities for data quality management. Proceedings of the 18th Australasian Conference on Information Systems (ACIS), 417–425.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.
Refbacks
- There are currently no refbacks.