Information Technology Reference
In-Depth Information
[9] Gupta, A., Zhdanov, D.: Growth and sustainability of managed security ser-
vices networks: an economic perspective. Economics of Information Security, 1-35
(2007)
[10] Hader, M.: Delphi-Befragungen: Ein Arbeitsbuch. VS Verlag fur SW (2009)
[11] Hofer, C., Karagiannis, G.: Cloud computing services: taxonomy and comparison.
Journal of Internet Services and Applications, 1-14 (2011)
[12] Jain, A., Flynn, P., Ross, A. (eds.): Handbook of Biometrics. Springer, New York
(2007)
[13] Linstone, H., Turoff, L., Turoff, M.: The Delphi Method: Techniques and Appli-
cations (2002)
[14] Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enter-
prise Perspective on Risks and Compliance. O'Reilly Media, Inc. (2009)
[15] Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute
of Standards and Technology 53(6), 50 (2009),
http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc
[16] Okoli, C., Pawlowski, S.D.: The Delphi method as a research tool: an example,
design considerations and applications. Information & Management 42(1), 15-29
(2004)
[17] Senk, C., Holzapfel, A.: Market overview of security as a service systems. In:
Pohlmann, N., Reimer, H., Schneider, W. (eds.) ISSE 2011 Securing Electronic
Business Processes (2011)
[18] Smith, R.E.: Authentication: From passwords to public keys. Addison-Wesley,
Boston (2002)
 
 
Search WWH ::




Custom Search