{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:05:44Z","timestamp":1726409144779},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_9","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"94-105","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Aware Cloud Deployment Scenario Selection"],"prefix":"10.1007","author":[{"given":"Kristian","family":"Beckers","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Fa\u00dfbender","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"National Institute of Standards and Technology: The NIST definition of cloud computing (2011)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54069-1_1","volume-title":"Privacy Technologies and Policy","author":"K. Beckers","year":"2014","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer aided privacy threat identification. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol.\u00a08319, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"9_CR3","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley (2001)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"C\u00f4t\u00e9, I., Hatebur, D., Heisel, M., Schmidt, H.: UML4PF \u2013 a tool for problem-oriented requirements analysis. In: Proceedings of RE, pp. 349\u2013350. IEEE Computer Society (2011)","DOI":"10.1109\/RE.2011.6051670"},{"key":"9_CR5","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-55137-6_12","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"R. Meis","year":"2014","unstructured":"Meis, R.: Problem-Based Consideration of Privacy-Relevant Domain Knowledge. In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IFIP AICT, vol.\u00a0421, pp. 150\u2013164. Springer, Heidelberg (2014)"},{"key":"9_CR6","unstructured":"UML Revision Task Force: OMG Unified Modeling Language: Superstructure (May 2012)"},{"issue":"4","key":"9_CR7","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s00766-013-0166-7","volume":"18","author":"C. Kalloniatis","year":"2013","unstructured":"Kalloniatis, C., Mouratidis, H., Islam, S.: Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng.\u00a018(4), 299\u2013319 (2013)","journal-title":"Requir. Eng."},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00766-013-0174-7","volume":"18","author":"K. Beckers","year":"2013","unstructured":"Beckers, K., C\u00f4t\u00e9, I., Fa\u00dfbender, S., Heisel, M., Hofbauer, S.: A pattern-based method for establishing a cloud-specific information security management system - establishing information security management systems for clouds considering security, privacy, and legal compliance. Requir. Eng.\u00a018(4), 343\u2013395 (2013)","journal-title":"Requir. Eng."},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C. Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requir. Eng.\u00a013, 241\u2013255 (2008)","journal-title":"Requir. Eng."},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: A security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements. In: RE (2011)","DOI":"10.1007\/s00766-010-0115-7"},{"key":"9_CR12","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press, Redmond (2006)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: IEEE Int. Conf. on Cloud Computing (CLOUD), pp. 541\u2013548. IEEE Computer Society (July 2011)","DOI":"10.1109\/CLOUD.2011.59"},{"key":"9_CR14","first-page":"243","volume-title":"Proc. of the ACM SIGCOMM Conf.","author":"M. Hajjat","year":"2010","unstructured":"Hajjat, M., Sun, X., Sung, Y.E., Maltz, D., Rao, S., Sripanidkulchai, K., Tawarmalani, M.: Cloudward bound: Planning for beneficial migration of enterprise applications to the cloud. In: Proc. of the ACM SIGCOMM Conf., pp. 243\u2013254. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:56:34Z","timestamp":1558976194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}