{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:50:55Z","timestamp":1725745855789},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_16","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T01:53:28Z","timestamp":1376877208000},"page":"224-239","source":"Crossref","is-referenced-by-count":2,"title":["A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario"],"prefix":"10.1007","author":[{"given":"Kristian","family":"Beckers","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Hofbauer","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[]},{"given":"Christopher C.","family":"Wills","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley (2009)","DOI":"10.1145\/1721654.1721672"},{"key":"16_CR2","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Working Paper of the National Institute of Standards and Technology (NIST) (2009)"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"L.M. Vaquero","year":"2008","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: Towards a cloud definition. Special Interest Group on Data Communication (SIGCOMM) Computer Communication Review\u00a039(1), 50\u201355 (2008)","journal-title":"Special Interest Group on Data Communication (SIGCOMM) Computer Communication Review"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and simulation of scalable cloud computing environments and the cloudsim toolkit: Challenges and opportunities. In: Proceedings of the International Conference von High Performance Computing and Simulation (HPCS). IEEE Computer Society Press (2009)","DOI":"10.1109\/HPCSIM.2009.5192685"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Beckers, K., Kuester, J., Fa\u00dfbender, S., Schmidt, H.: Pattern-based support for context establishment and asset identification of the iso 27000 in the field of cloud computing. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES). IEEE Computer Society Press (2011)","DOI":"10.1109\/ARES.2011.55"},{"key":"16_CR6","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley (2001)"},{"key":"16_CR7","unstructured":"Fowler, M.: Analysis Patterns: Reusable Object Models. Addison-Wesley (1996)"},{"key":"16_CR8","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley (1994)"},{"key":"16_CR9","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley (2006)"},{"key":"16_CR10","unstructured":"International Organization for Standardization (ISO), International Electrotechnical Commission (IEC): Information technology - Security techniques - Information security management systems - Requirements. ISO\/IEC 27001 (2005)"},{"key":"16_CR11","unstructured":"Government, H.: It infrastructure library (itil) (2012), \n                      \n                        http:\/\/www.itil-officialsite.com\/home\/home.aspx"},{"key":"16_CR12","unstructured":"Calder, A.: Implementing Information Security based on ISO 27001\/ISO 27002: A Management Guide. Haren Van Publishing (2009)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Kersten, H., Reuter, J., Schroeder, K.: ITSicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner (2011)","DOI":"10.1007\/978-3-8348-8165-6"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Klipper, S.: Information Security Risk Management mit ISO\/IEC 27005: Risikomanagement mit ISO\/IEC 27001, 27005 und 31010. Vieweg+Teubner (2010)","DOI":"10.1007\/978-3-8348-9870-8_3"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Cheremushkin, D., Lyubimov, A.: An application of integral engineering technique to information security standards analysis and refinement. In: SIN 2010 (2010)","DOI":"10.1145\/1854099.1854106"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Lyubimov, A., Cheremushkin, D., Andreeva, N., Shustikov, S.: Information security integral engineering technique and its application in isms design. In: Proceedings of the International Conference on Availability, Reliability and Security, ARES (2011)","DOI":"10.1109\/ARES.2011.121"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Montesino, R., Fenz, S.: Information security automation: how far can we go? In: Proceedings of the International Conference on Availability. IEEE Computer Society Press (2011)","DOI":"10.1109\/ARES.2011.48"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., Weippl, E.: Information security fortification by ontological mapping of the iso\/iec 27001 standard. In: Proceedings of the International Symposium on Dependable Computing. IEEE Computer Society Press (2007)","DOI":"10.1109\/PRDC.2007.29"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T18:37:05Z","timestamp":1558031825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}