dc.contributor.author | Duncan, Bob | |
dc.contributor.author | Whittington, Mark | |
dc.contributor.author | Jaatun, Martin Gilje | |
dc.contributor.author | Zuniga, Alfredo Ramiro Reyes | |
dc.contributor.editor | Chang, Victor | |
dc.contributor.editor | Ramachandran, Muthu | |
dc.contributor.editor | Walters , Robert J | |
dc.contributor.editor | Wills, Gary | |
dc.date.accessioned | 2017-04-12T08:28:15Z | |
dc.date.available | 2017-04-12T08:28:15Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Duncan , B , Whittington , M , Jaatun , M G & Zuniga , A R R 2017 , Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements? in V Chang , M Ramachandran , R J Walters & G Wills (eds) , Enterprise Security . Lecture Notes in Computer Science , vol. 10131 , Springer , pp. 19-39 , Second International Workshop , Vancouver, BC , Canada , 30/11/15 . https://doi.org/10.1007/978-3-319-54380-2_2 | en |
dc.identifier.citation | conference | en |
dc.identifier.isbn | 978-3-319-54379-6 | |
dc.identifier.isbn | 978-3-319-54380-2 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | PURE: 69898217 | |
dc.identifier.other | PURE UUID: d85a4c0e-ed33-46df-bba3-619cbb6dcdac | |
dc.identifier.other | Scopus: 85015926129 | |
dc.identifier.uri | http://hdl.handle.net/2164/8477 | |
dc.format.extent | 22 | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Enterprise Security | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science | en |
dc.rights | The final publication is available at link.springer.com | en |
dc.subject | cloud | en |
dc.subject | requirements | en |
dc.subject | measurement | en |
dc.subject | assurance | en |
dc.subject | outsourcing | en |
dc.subject | incident response | en |
dc.subject | security | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject.lcc | QA75 | en |
dc.title | Could the Outsourcing of Incident Response Management provide a Blueprint for Managing Other Cloud Security Requirements? | en |
dc.type | Book item | en |
dc.contributor.institution | University of Aberdeen.Computing Science | en |
dc.contributor.institution | University of Aberdeen.Accountancy | en |
dc.description.version | Postprint | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-319-54380-2_2 | |