首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

Automated Risk Management Framework for Cloud Computing Environment

ABSTRACT第5-7页
摘要第8-10页
Table of Contents第10-12页
List of Figures第12-13页
List of Tables第13-14页
CHAPTER 1.INTRODUCTION第14-21页
    1.1. Motivation第15-20页
        1.1.1. An Automated Risk and Utility Management:AURUM第15-17页
        1.1.2. Cloud Computing Environment第17-20页
    1.2. Thesis Contribution and Organization第20-21页
CHAPTER 2.BACKGROUND AND LITERATURE REVIEW OF RELATED WORKS第21-40页
    2.1. Information Security Risk Management[ISRM]第21-31页
        2.1.1. Risk Management Process(RMP)第21-23页
        2.1.2. Risk Management Framework[RMF]第23-27页
        2.1.3. Automated Risk and Utility Management[AURUM)第27-31页
    2.2. Cloud Computing Security第31-38页
        2.2.1. Cloud Computing Definition第31-35页
            2.2.1.1. Essential characteristics第31-32页
            2.2.1.2. Service Models第32-34页
            2.2.1.3. Deployment Models第34-35页
        2.2.2. Key Security and Privacy Issues with Cloud computing第35-38页
            2.2.2.1. Strategic and tactical security "pain points"第35-37页
            2.2.2.2. Risk Management approaches in the Cloud Model第37-38页
    2.3. Summary第38-40页
CHAPTER 3.METHODOLOGY第40-45页
    3.1. Background第40-42页
        3.1.1. General definitions第40页
        3.1.2. Previous methods on the ISRM第40-42页
    3.2. Problems statement第42-43页
        3.2.1. Preliminary Problem statement第42-43页
        3.2.2. Problems when tackling the subject第43页
    3.3. Overview of the research approach第43-45页
CHAPTER 4.RISK AWARE FRAMEWORK FOR CLOUD ECOSYSTEM [RAFCE)第45-61页
    4.1. RAFCE Process第45-50页
        4.1.1. Major concern第45-48页
            4.1.1.1. Cloud Model effect第45页
            4.1.1.2. Cloud Importance第45-47页
            4.1.1.3. The Audit第47页
            4.1.1.4. Impacts on the assets of the cloud-related risks第47-48页
        4.1.2. Carrying-out of the concerns第48-50页
            4.1.2.1. Synopsis第48页
            4.1.2.2. Structural design第48-50页
    4.2. Description of the approach第50-61页
        4.2.1. Business Process Importance Determination第50-51页
        4.2.2. Inventory第51-53页
        4.2.3. Threat Probability Determination第53-58页
        4.2.4. Risk Determination第58-59页
        4.2.5. Control Identification and Evaluation第59-61页
CHAPTER 5.SIMULATION,EVALUATION,AND LIMITATION第61-71页
    5.1. Simulation第61-69页
        5.1.1. The scenario第61-62页
        5.1.2. Inventory第62-65页
        5.1.3. Business Process Importance Determination第65-66页
        5.1.4. Threat Probability Determination第66-67页
        5.1.5. Risk calculation第67页
        5.1.6. Control Identification and Evaluation第67-69页
    5.2. Evaluation第69-70页
        5.2.1. Reaching the objectives第69-70页
        5.2.2. Contrasting第70页
    5.3. Limitation第70-71页
CHAPTER 6.CONCLUSION AND FUTURE WORK第71-72页
REFERENCES第72-76页
ABBREVIATIONS第76-77页
APPENDIX第77-79页
ACKNOWLEDGMENTS第79页

论文共79页,点击 下载论文
上一篇:基于μC/OS-Ⅱ的动态压力控制器设计
下一篇:基于Maya三维动画制作技术的两相流流体仿真研究