@conference {576, title = {An applied methodology for information security and assurance: A study case for cloud computing}, booktitle = {Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for}, year = {2014}, month = {12/2014}, abstract = {

Information security is one of the main concerns in many fields of computer and information technologies, and even more on new emerging technologies such as cloud computing. Current security standards and models usually focus on "what" has to be done about security, but they do not propose "how" to deal with the inherent complexity of assuring modern infrastructures. Security standards usually produce large check lists describing security countermeasures, but they lack a comprehensive and complete process to define the security requirements of information being managed. As a consequence, security implementations may miss important security controls, and they cannot guarantee a consistent and in-depth security implementation at the different layers of the system. We propose a methodology with a novel hierarchical approach to guide a comprehensive and complete assurance process. Real use cases are shown, by applying our methodology to assure a private cloud being developed at the Universidad de Costa Rica (UCR).

}, keywords = {cloud computing, Computational modeling, Hardware, information security, Servers, Standards}, doi = {10.1109/ICITST.2014.7038851}, author = {Villalon-Fonseca, R. and Solano-Rojas, B.J. and Marin-Raventos, G.} }