MAIN PAGE
> Back to contents
National Security
Reference:
Tsaregorodtsev, A.V.
Forming the trees of objectives for the
identification of security requirements of
the cloud computing environments.
// National Security.
2013. № 5.
P. 51-68.
URL: https://en.nbpublish.com/library_read_article.php?id=63366
Tsaregorodtsev, A.V. Forming the trees of objectives for the
identification of security requirements of
the cloud computing environments.
Abstract:
The need for the improvement and
higher efficiency of the cardinal principles of
information security management in the sphere
of cloud computing requires a multi-aspect
sphere of guarantees for the systemic quality.
Application of the formalized structural synthesis
methods and technologies for the systems of
information security management in the cloud
computing, providing for various levels of
requirements hierarchy, could allow for the more
efficient use of local technologies and automation
qualities, as well as systemic manifestations. The
empiric quality of tree models systemic structure
provides a good opportunity. Special attention
is paid to formation of the trees of objectives for
the identification of security requirements in the
cloud computing and formation of the basis for
the formalized synthesis of security platforms
in information and telecommunications systems,
functioning based upon the cloud computing
technologies in accordance with the established
systemic criteria and the system development
factor. Considering the lack of transparency in
such spheres as service level agreements, and
realistic supplier capabilities, existing in most
cloud computing services, the prerequisites are
formed for the formation of a novel method for
the formation of the hybrid sphere of information
security requirements for cloud computing.
Keywords:
information security, cloud computing, cloud services, information security threats, analysis of information risks, management methods, information security requirements, business assets, tree of objectives, hybrid environment.
This article can be downloaded freely in PDF format for reading. Download article
This article written in Russian. You can find original text of the article here
.
References
1. Tsaregorodtsev A.V., Kachko A.K. Obespechenie informatsionnoy bezopasnosti na oblachnoy arkhitekture organizatsii // Natsional'naya bezopasnost'. – M.: Izd-vo "NB Media", 2011.-№ 5. – S. 25-34.
2. Tsaregorodtsev A.V., Kachko A.K. Odin iz podkhodov k upravleniyu informatsionnoy bezopasnost'yu pri razrabotke informatsionnoy infrastruktury organizatsii // Natsional'naya bezopasnost'. – M.: Izd-vo "NB Media", 2012.-№ 1(18). – S. 46-59.
3. Chen I. Pekson I., Pekson V., (2010) Novye problemy informatsionnoy bezopasnosti oblakov. Tekhnicheskiy otchet UCB/EECS-2010-5, Departament EECS, Universitet Kalifornii, Berkli.
Link to this article
You can simply select and copy link from below text field.
|