dc.contributor.author | Duncan, Bob | |
dc.contributor.author | Whittington, Mark | |
dc.date.accessioned | 2017-01-20T17:36:52Z | |
dc.date.available | 2017-01-20T17:36:52Z | |
dc.date.issued | 2015-11-30 | |
dc.identifier.citation | Duncan , B & Whittington , M 2015 , Information Security in the Cloud: Should We be Using a Different Approach? in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) . Institute of Electrical and Electronics Engineers (IEEE) , pp. 523-528 , 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) , Vancouver , Canada , 30/11/15 . https://doi.org/10.1109/CloudCom.2015.92 | en |
dc.identifier.citation | conference | en |
dc.identifier.isbn | 978-1-4673-9561-8 | |
dc.identifier.isbn | 978-1-4673-9560-1 | |
dc.identifier.other | PURE: 69898005 | |
dc.identifier.other | PURE UUID: 6433bd94-0de1-42ff-a9cb-4495a8939391 | |
dc.identifier.other | Scopus: 84964395606 | |
dc.identifier.uri | http://hdl.handle.net/2164/8042 | |
dc.format.extent | 6 | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartof | 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) | en |
dc.rights | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en |
dc.subject | security | en |
dc.subject | privacy | en |
dc.subject | standards | en |
dc.subject | compliance | en |
dc.subject | assurance | en |
dc.subject | audit | en |
dc.subject | measurement | en |
dc.subject | cloud service providers | en |
dc.subject | service level agreements | en |
dc.subject | threat environment | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject.lcc | QA75 | en |
dc.title | Information Security in the Cloud: Should We be Using a Different Approach? | en |
dc.type | Conference item | en |
dc.contributor.institution | University of Aberdeen.Finance | en |
dc.contributor.institution | University of Aberdeen.Computing Science | en |
dc.contributor.institution | University of Aberdeen.Accountancy | en |
dc.description.version | Postprint | en |
dc.identifier.doi | https://doi.org/10.1109/CloudCom.2015.92 | |