{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:18:00Z","timestamp":1730297880609,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/smc.2017.8122775","type":"proceedings-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T17:22:47Z","timestamp":1512062567000},"page":"1196-1201","source":"Crossref","is-referenced-by-count":4,"title":["A multi-perspective methodology for evaluating the security maturity of data centers"],"prefix":"10.1109","author":[{"given":"Milton V. M.","family":"Lima","sequence":"first","affiliation":[]},{"given":"Ricardo M. F.","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Fernando A. A.","family":"Lins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security Hardening Guide for IBM WebSphere Portal","year":"2016","author":"vault","key":"ref33"},{"journal-title":"The debian administrator's handbook","year":"2012","author":"hertzog","key":"ref32"},{"journal-title":"Red Hat Enterprise Linux Deployment Guide","year":"2007","author":"smith","key":"ref31"},{"journal-title":"Microsoft","article-title":"Microsoft Baseline Security Analyzer 2.3 (for IT Professionals)","year":"2017","key":"ref30"},{"key":"ref35","first-page":"55","article-title":"A technique for the measurement of attitudes","volume":"22","author":"likert","year":"1932","journal-title":"Arch Psychol"},{"key":"ref34","article-title":"Design and Use of Information Security Metrics","author":"lundholm","year":"2011","journal-title":"FOI Swedish Defence Research Agency"},{"key":"ref10","first-page":"1","article-title":"Best practices show the way to Information Security Maturity","author":"lessing","year":"2008","journal-title":"6th Natl Conf Process Establ Assess Improv Inf Technol (ImproveIT 2008)"},{"key":"ref11","first-page":"1","article-title":"Modelling Cyber Security Governance Maturity","volume":"2016","author":"de bruin","year":"2016","journal-title":"Int Symp Technof Soc Proc"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11553939_87"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2016.7575045"},{"journal-title":"Information technology-Security techniques-Code of practice for information security controls second edition ed","first-page":"1","year":"2013","key":"ref14"},{"journal-title":"Security and Privacy Controls for Federal Information Systems and Organizations","year":"2014","key":"ref15"},{"journal-title":"ISO\/IEC 27001","article-title":"Information technology&#x2014;Security techniques&#x2014;Information security management systems&#x2014;Requirements","year":"2013","key":"ref16"},{"journal-title":"ISO\/IEC 27004-Information technology-Security techniques-Information security management-Monitoring measurement analysis and evaluation","year":"2016","key":"ref17"},{"journal-title":"International Organization for Standardization","article-title":"ISO\/IEC 27005:2011 Information technology&#x2014;Security techniques&#x2014;Information security risk management","year":"2011","key":"ref18"},{"key":"ref19","article-title":"Guide to General Server Security Recommendations of the National Institute of Standards and Technology","author":"scarfone","year":"2008","journal-title":"Spec Publ 800&#x2013;123"},{"journal-title":"OWASP Top 10","article-title":"OWASP Top 10 Application Security Risks-2017","year":"2017","key":"ref28"},{"key":"ref4","first-page":"1","article-title":"Toward a Secure Data Center Model","volume":"3","author":"van niekerk","year":"2015","journal-title":"ISACA Journal"},{"journal-title":"OWASP The Open Web Application Security Project","year":"2017","key":"ref27"},{"key":"ref3","first-page":"4","article-title":"An ict security management framework","author":"chatzipoulidis","year":"2010","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference on"},{"key":"ref6","first-page":"1","article-title":"Directions in Security Metrics Research, NISTIR 7564","author":"jansen","year":"2009","journal-title":"Natl Inst Stand Technol"},{"key":"ref29","first-page":"70","author":"manico","year":"2016","journal-title":"Application Security Verification Standard 3 0 1"},{"journal-title":"TIA Standard ANSI\/TIA-942&#x2013;2005 Telecommunications Infrastructure Standard for Data Center","first-page":"148","year":"2005","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIT.2010.5607700"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2008.Workshops.46"},{"key":"ref2","first-page":"1","author":"taubenberger","year":"2008","journal-title":"IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements"},{"key":"ref9","first-page":"482","article-title":"CMMI for Development, Version 1.3","author":"sei","year":"2010","journal-title":"Carnegie Mellon Univ"},{"key":"ref1","article-title":"Network-Aware Job Placement in Datacenter Environments","author":"li","year":"2014","journal-title":"Department of Computer Science University of Calgary"},{"key":"ref20","first-page":"320","article-title":"Managing Information Security Risk","author":"christopher alberts","year":"2011","journal-title":"NIST Spec Publ"},{"key":"ref22","article-title":"Guidelines on Securing Public Web Servers Recommendations of the National Institute of Standards and Technology","author":"winograd","year":"2007","journal-title":"NIST Spec Publ 500&#x2013;299"},{"key":"ref21","article-title":"The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1. 0 Recommendations of the National Institute of Standards and Technology","author":"banghart","year":"2011","journal-title":"NIST Spec Publ"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-17"},{"journal-title":"NIST Special Publication 800&#x2013;14 Generally Accepted Principles and Practices for Securing Information Technology Systems","year":"1996","author":"swanson","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-128"},{"key":"ref25","article-title":"TG-19, Part 1: Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures","author":"services","year":"1999","journal-title":"Test"}],"event":{"name":"2017 IEEE International Conference on Systems, Man and Cybernetics (SMC)","start":{"date-parts":[[2017,10,5]]},"location":"Banff, AB","end":{"date-parts":[[2017,10,8]]}},"container-title":["2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8114675\/8122565\/08122775.pdf?arnumber=8122775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T18:15:58Z","timestamp":1516212958000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8122775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/smc.2017.8122775","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}