Please use this identifier to cite or link to this item:

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

File SizeFormat 
paper0600.pdf1.42 MBAdobe PDFView/Open

Item Summary

Title: A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
Authors: Argyropoulos, Nikolaos
Shei, Shaun
Kalloniatis, Christos
Mouratidis, Haralambos
Delaney, Aidan
show 2 moreFish, Andrew
Gritzalis, Stefanos

show less
Keywords: Business Process Modelling
Cloud Computing
Semi-automatic Process
Issue Date: 04 Jan 2017
Abstract: Cloud computing provides a wide range of services to organisations in a flexible and cost efficient manner. Nevertheless, inherent cloud security issues make organisations hesitant towards the migration of their services to cloud. In parallel, the cloud service-oriented nature requires a specific and more demanding description of the business functional requirements intended for migration. Organisations need to transform their functional requirements based on a specific language, taking into account the respective non-functional requirements of the migrating services. Thus, the need for an approach that will holistically capture organisations' security and privacy requirements and transform them to cloud service requirements is immense. To this end, this paper presents an approach that takes as input abstract security and privacy requirements and produces through a semi-automatic process various alternative implementation options for cloud services. To achieve that a series of model transformations are utilised in order to create a mapping between the organisational and the operational level of the system's analysis.
Pages/Duration: 10 pages
ISBN: 978-0-9981331-0-2
DOI: 10.24251/HICSS.2017.587
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections:Enterprise Architecture and Business Processes Analysis Minitrack

Please contact if you need this content in an ADA compliant alternative format.

Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.