Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101116. https://doi.org/10.1016/j.ins.2015.09.004
    2. Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364368. https://doi.org/10.1016/j.ijinfomgt.2013.11.002
    3. Sajid, M. (2013). Cloud Computing : Issues & Challenges.
    4. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 111. https:// doi. org/ 10.1016 /j.jnca. 2010. 07. 006
    5. Susanto, H., Almunawar, M., & Tuan, Y. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical Computer Sciences IJECS-IJENS, 11(5), 2329.
    6. Hayne, C., & Free, C. (2014). Hybridized professional groups and institutional work: COSO and the rise of enterprise risk management. Accounting, Organizations and Society, 39(5), 309330. https://doi. org/ 10. 1016/ j.aos. 2014.05.002
    7. Aljazzaf, Z. M., Capretz, M. A. M., & Perry, M. (2016). Trust-based Service-Oriented Architecture. Journal of King Saud University - Computer and Information Sciences, 28(4), 470480. https://doi. org/ 10.1016/ j.jksuci. 2015. 12.003
    8. Townsend, E. (2008). The 25 year History of Service Oriented Architecture. Wallshein, C. C., & Loerch, A. G. (2015). The Journal of Systems and Software Software cost estimating for CMMI Level 5 developers. The Journal of Systems & Software, 105, 7278. http://https: //doi .org/ 10.1016 /j.jss. 2015. 03. 069
    9. http://blog.deurainfosec.com
    10. http://www.techrepublic.com/blog/it-security
    11. https://www.itgovernance.co.uk/iso27001
    12. https://www.iso.org/isoiec-27001-informationsecurity.html
    13. https://www.wikipedia.org/opm3
    14.  Abdulkader, Alfantookh. (2009) An Approach for the Assessment of The Application of ISO 27001 Essential Information Security Controls. Computer Sciences, King Saud University.
    15. Theobald, J. (n.d.). The Road to BS7799 Certification and using ISO17799 as an Information Security Framework.
    16. https://www.itgovernance.co.uk/iso27001-benefits
    17. https://www.slideshare.net/ifourabhishek/ draw backso fiso 27001
    18. Huang, S. J., & Han, W. M. (2006). Selection priority of process areas based on CMMI continuous representation. Information and Management, 43(3), 297307. https://doi.org/10.1016/j.im.2005.08.003
    19. https://www.coursehero.com/file/pfudb5/Disadvantag es-of-using-COBIT-to-establish-an-IT-management-andgovernance/

Recent Article