REFERENCES
Alebrahim, A., Hatebur, D., and Goeke, L. (2014). Pattern-
based and ISO 27001 compliant risk analysis for cloud
systems. In Evolving Security and Privacy Require-
ments Engineering (ESPRE), 2014 IEEE 1st Work-
shop on, pages 42–47.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz,
R. H., Konwinski, A., Lee, G., Patterson, D. A.,
Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above
the clouds: A berkeley view of cloud computing.
Technical Report UCB/EECS-2009-28, EECS De-
partment, University of California, Berkeley.
Beckers, K., Schmidt, H., Kuster, J., and Fassbender, S.
(2011). Pattern-Based Support for Context Establish-
ment and Asset Identification of the ISO 27000 in the
Field of Cloud Computing. In Availability, Reliability
and Security (ARES), 2011 Sixth International Con-
ference on, pages 327–333.
CARiSMA (2015). Carisma framework. https://www-
secse.cs.tu-dortmund.de/carisma/.
Cloud Security Alliance (2011). Security guidance
for critical areas of focus in cloud computing
v3.0. https://downloads.cloudsecurityalliance.org/ ini-
tiatives/guidance/csaguide.v3.0.pdf.
Cloud Security Alliance (2013). The notorious
nine cloud computing top threats in 2013.
https://cloudsecurityalliance.org/download/the-
notorious-nine-cloud-computing-top-threats-in-
2013/.
Cloud Security Alliance (2014). Cloud Control Ma-
trix. https://downloads.cloudsecurityalliance.org/init
iatives/ccm/ccm-v3.0.1.zip.
ClouDAT (2015). Cloudat project. http://ti.uni-
due.de/ti/clouddat/de/.
DISA (2015). Application Security and Development
STIG V3 R10. http://iase.disa.mil/stigs/Documents/
U Application Security and Development V3R4
STIG.zip.
European Network and Information Security Agency
(2009). Cloud computing - benefits, risks
and recommendations for information security.
https://resilience.enisa.europa.eu/cloud-security-and-
resilience/publications/cloud-computing-benefits-
risks-and-recommendations-for-information-security.
Fernandez-Buglioni, E. (2013). Security Patterns in Prac-
tice: Designing Secure Architectures Using Software
Patterns. Wiley Publishing, 1st edition.
Fern
´
andez-Medina, E., J
¨
urjens, J., Trujillo, J., and Jajodia,
S. (2009). Model-driven development for secure infor-
mation systems. Information & Software Technology,
51(5):809–814.
Heiser, J. and Nicolett, M. (2008). Assess-
ing the security risks of cloud computing.
https://www.gartner.com/doc/685308/assessing-
security-risks-cloud-computing.
ISO (2008). ISO/IEC 27005 Information technology - Se-
curity techniques -Information security risk manage-
ment. ISO 27005:2008, International Organization for
Standardization, Geneva, Switzerland.
ISO (2013). ISO/IEC 27001 Information Security Manage-
ment System (ISMS) standard. ISO 27001:2013, In-
ternational Organization for Standardization, Geneva,
Switzerland.
ISO (2014). ISO/IEC 27000 Information technology Secu-
rity techniques Information security management sys-
tems Overview and vocabulary. ISO 27000:2014, In-
ternational Organization for Standardization, Geneva,
Switzerland.
Jin, X., Sandhu, R., and Krishnan, R. (2012). Rabac: Role-
centric attribute-based access control. In Proceedings
of the 6th International Conference on Mathematical
Methods, Models and Architectures for Computer Net-
work Security: Computer Network Security, MMM-
ACNS’12, pages 84–96, Berlin, Heidelberg. Springer-
Verlag.
J
¨
urjens, J. (2000). Secure information flow for concurrent
processes. In 11th International Conference on Con-
currency Theory (CONCUR 2000), volume 1877 of
Lecture Notes in Computer Science, pages 395–409.
Springer Verlag.
J
¨
urjens, J. (2001). Modelling audit security for smart-card
payment schemes with UMLsec. In 16th International
Conference on Information Security (IFIPSEC”01),
pages 93–108. IFIP, Kluwer.
J
¨
urjens, J. (2005a). Secure Systems Development with UML.
Springer. Chinese translation: Tsinghua University
Press, Beijing 2009.
J
¨
urjens, J. (2005b). Verification of low-level crypto-
protocol implementations using automated theorem
proving. In 3rd ACM & IEEE International Confer-
ence on Formal Methods and Models for Co-Design
(MEMOCODE 2005), pages 89–98. Institute of Elec-
trical and Electronics Engineers.
J
¨
urjens, J. and Wimmel, G. (2001a). Formally testing fail-
safety of electronic purse protocols. In 16th Interna-
tional Conference on Automated Software Engineer-
ing (ASE 2001), pages 408–411. IEEE.
J
¨
urjens, J. and Wimmel, G. (2001b). Security modelling
for electronic commerce: The Common Electronic
Purse Specifications. In First IFIP Conference on
e-Commerce, e-Business, and e-Government (I3E),
pages 489–505. Kluwer.
National Institute for Standards and Technology (2011).
The NIST Definition of Cloud Computing. Technical
report, Special Publication 800-145 of the National
Institute of Standards and Technology (NIST).
http://csrc.nist.gov/publications/nistpubs/800-
145/SP800-145.pdf.
Nist and Aroms, E. (2012). NIST Special Pub-
lication 800-53 Revision 4 Recommended
Security Controls for Federal Information
Systems and Organizations. CreateSpace,
Paramount, CA. http://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-53r4.pdf.
Supporting the Security Certification of Cloud-Computing-Infrastructures
73