Home // CLOUD COMPUTING 2017, The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization // View article
Authors:
Argyri Pattakou
Christos Kalloniatis
Stefanos Gritzalis
Keywords: security; privacy; requirements; engineering methods; traditional architectures; cloud computing
Abstract:
As the software industry experiences a rapid growth in developing information systems, many methodologies, technolo- gies and tools are continuously developing in order to support the system implementation process. However, as security and privacy have been considered important aspects of an information system, many researchers presented methods that, through a number of specific steps, enable system designers to integrate security and privacy requirements at the early stage of system design. Different security and privacy engineering methods have been presented in order to be applied in traditional or cloud architectures. This paper reviews a number of security and privacy requirements engineering methods in both areas and presents a comparative study between these methods.
Pages: 145 to 151
Copyright: Copyright (c) IARIA, 2017
Publication date: February 19, 2017
Published in: conference
ISSN: 2308-4294
ISBN: 978-1-61208-529-6
Location: Athens, Greece
Dates: from February 19, 2017 to February 23, 2017