Reflecting on Whether Checklists Can Tick the Box for Cloud Security
| dc.contributor.author | Duncan, Robert Anderson Keith | |
| dc.contributor.author | Whittington, Mark | |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.contributor.institution | University of Aberdeen.Accountancy | en |
| dc.date.accessioned | 2017-01-17T12:28:26Z | |
| dc.date.available | 2017-01-17T12:28:26Z | |
| dc.date.issued | 2014-12-18 | |
| dc.format.extent | 6 | |
| dc.format.extent | 157359 | |
| dc.identifier | 69874673 | |
| dc.identifier | 39099f06-285d-4393-a9e1-b64f04b3549f | |
| dc.identifier | 84937877417 | |
| dc.identifier.citation | Duncan, R A K & Whittington, M 2014, Reflecting on Whether Checklists Can Tick the Box for Cloud Security. in 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. Institute of Electrical and Electronics Engineers (IEEE), pp. 805-810, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), Singapore, Singapore, 15/08/16. https://doi.org/10.1109/CloudCom.2014.165 | en |
| dc.identifier.citation | conference | en |
| dc.identifier.doi | 10.1109/CloudCom.2014.165 | |
| dc.identifier.isbn | 9781479940929 | |
| dc.identifier.uri | http://hdl.handle.net/2164/8009 | |
| dc.language.iso | eng | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
| dc.relation.ispartof | 2014 IEEE 6th International Conference on Cloud Computing Technology and Science | en |
| dc.subject | security | en |
| dc.subject | standards | en |
| dc.subject | compliance | en |
| dc.subject | assurance | en |
| dc.subject | audit | en |
| dc.subject | QA75 Electronic computers. Computer science | en |
| dc.subject.lcc | QA75 | en |
| dc.title | Reflecting on Whether Checklists Can Tick the Box for Cloud Security | en |
| dc.type | Conference item | en |
