Casola, V., Preziosi, R., Rak, M., and Troiano, L. (2005). A
Reference Model for Security Level Evaluation: Pol-
icy and Fuzzy Techniques. J. UCS, 11(1):150–174.
Casola, V., Rak, M., and Villano, U. (2010). Identity Feder-
ation in Cloud Computing. In Sixth International Con-
ference on Information Assurance and Security (IAS),
pages 253–259. IEEE.
Catteddu, D. et al. (2011). Security & Resilience in Govern-
mental Clouds. European Network and Information
Security Agency (ENISA).
Catteddu, D. and Hogben, G. (2009). Cloud Computing
Risk Assessment. European Network and Information
Security Agency (ENISA).
Catteddu, D., Hogben, G., et al. (2009). Cloud Computing
Information Assurance Framework. European Net-
work and Information Security Agency (ENISA).
CCM (2011). Cloud Control Matrix. Online:
http://www.cloudsecurityalliance.org/cm.html.
Center for Internet Security (2010). The CIS security met-
rics. Technical Report 28, Center for Internet Security.
Chaum, D. (1985). Security without identification, card
computers to make big brother obsolete. Original
Version appeared in: Communications of the ACM,
28(10):1030–1044.
Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A.,
and Robinson, W. (2008). Performance measurement
guide for information security. Technical Report July,
National Institute of Standards and Technology.
CloudAudit (2011). CloudAudit. Online:
http://cloudaudit.googlecode.com/svn/trunk/docs/draft-
hoff-cloudaudit.txt.
CoMiFin (2011). Communication Middleware for Mon-
itoring Financial Critical Infrastructure. Online:
http://www.comifin.eu/.
CSA (2011). Cloud Security Alliance. Online:
http://www.cloudsecurityalliance.org.
D’Antonio, S., Romano, L., Khelil, A., and Suri, N. (2008).
INcreasing Security and Protection through Infras-
tructure REsilience: the INSPIRE Project. In Pro-
ceedings of The 3rd International Workshop on Criti-
cal Information Infrastructures Security (CRITIS’08).
ENISA (2011). European Network and Information Secu-
rity Agency. Online: http://www.enisa.europa.eu.
Ghani, H., Khelil, A., Suri, N., Csertn, G., Gnczy, L., Ur-
banics, G., and Clarke, J. (2010). Assessing the Secu-
rity of Internet Connected Critical Infrastructures (The
CoMiFin Project Approach). In Proceedings of the
Workshop on Security of the Internet of Things (Se-
cIoT 2010).
Grobauer, B. and Walloschek, T. (2010). Understanding
cloud-computing vulnerabilities. IEEE Security and
Privacy, pages 1–14.
Hogben, G. (2011). ENISA Cloud Computing Strat-
egy. Online: http://www.terena.org/activities/tf-
csirt/meeting30.
IGTF (2011). The International Grid Trust Federation. On-
line: http://www.igtf.net/.
INSPIRE (2011). INcreasing Security and Protec-
tion through Infrastructure REsilience. Online:
http://www.inspire-strep.eu/.
ISO27001 (2005). Information Security Man-
agement System (ISMS) standard. Online:
http://www.27000.org/iso-27001.htm.
Luna, J., Dikaiakos, M. D., Marazakis, M., and Kyprianou,
T. (2010). Data-centric privacy protocol for intensive
care grids. IEEE Transactions on Information Tech-
nology in Biomedicine, 14(6):1327–1337.
Luna, J., Flouris, M., Marazakis, M., and Bilas, A. (2008).
Providing security to the Desktop Data Grid. pages
1–8.
Mell, P. and Grance, T. (2009). The NIST Definition of
Cloud Computing. National Institute of Standards and
Technology (NIST).
Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin,
K., Llorente, I., Montero, R., Wolfsthal, Y., Elmroth,
E., and Caceres, J. (2010). The Reservoir Model and
Architecture for Open Federated Cloud Computing.
IBM Journal of Research and Development, 53(4):4.
Samson, T. (2011). Amazon EC2 Enables
Brute-force Attacks on the Cheap. Online:
http://infoworld.com/t/data-security/amazon-ec2-
enables-brute-force-attacks-the-cheap-447.
Savola, R., Juhola, A., and Uusitalo, I. (2010). Towards
Wider Cloud Service Applicability by Security, Pri-
vacy and Trust Measurements. In 4th International
Conference on Application of Information and Com-
munication Technologies (AICT), pages 1–6. IEEE.
Schryen, G., Volkamer, M., Ries, S., and Habib, S. (2011).
A formal approach towards measuring trust in dis-
tributed systems. In ACM Symp. on Applied Comput-
ing, pages 1739–1745.
Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lam-
badaris, J., and Hatfield, A. (2004). Current trends and
advances in information assurance metrics. In Pro-
ceeding of the Second Annual Conference on Privacy,
Security and Trust, pages 197–205.
Tan, J. (2001). Forensic Readiness. Technical report,
@Stake Organization.
Travis, D. and Annie, I. (2008). Analyzing Regulatory
Rules for Privacy and Security Requirements. IEEE
Trans. Software Eng., 34(1):5–20.
Trimintzios, P. (2011). Survey on Resilience Metrics.
European Network and Information Security Agency
(ENISA).
Wang, J. (2005). Information Security Models and Met-
rics. In Guimar˜aes, M., editor, ACM Southeast Re-
gional Conference, volume 2, pages 178–184. ACM.
SECRYPT 2011 - International Conference on Security and Cryptography
250