This HTML5 document contains 33 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n18https://kar.kent.ac.uk/id/eprint/75979#
n9http://purl.org/ontology/bibo/status/
n7https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n16https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n10http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n19https://kar.kent.ac.uk/id/publication/
n5https://kar.kent.ac.uk/75979/
n20https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n14doi:10.1016/
owlhttp://www.w3.org/2002/07/owl#
n11https://kar.kent.ac.uk/id/document/
n12https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n21https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n8https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:75979
rdf:type
n10:ArticleEPrint n10:EPrint bibo:AcademicArticle bibo:Article
rdfs:seeAlso
n5:
owl:sameAs
n14:j.cose.2019.101600
n10:hasAccepted
n11:3185486
n10:hasDocument
n11:3185486 n11:3185487 n11:3185488 n11:3185489 n11:3185490 n11:3185491
dc:hasVersion
n11:3185486
dcterms:title
Cyber risk assessment in cloud provider environments: Current models and future needs
wdrs:describedby
n16:export_kar_RDFN3.n3 n21:export_kar_RDFN3.n3
dcterms:date
2019-08-24
dcterms:creator
n8:ext-2c4621612ee2a10b7f931c6c40c1e4f0 n8:ext-36250dfdaa62e192c037ee8d28acba91 n8:ext-ed780169045b741763450f9b607eccf9 n8:ext-j.r.c.nurse@kent.ac.uk
bibo:status
n9:peerReviewed n9:published
dcterms:publisher
n20:ext-f308aad1ef8f70546c3a197f104f2ad5
bibo:abstract
Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud services, there has been little research on how cloud providers might assess their own services. In this paper, we use an in-depth review of the extant literature to highlight the weaknesses of traditional risk assessment frameworks for this task. Using examples, we then describe a new risk assessment model (CSCCRA) and compare this against three established approaches. For each approach, we consider its goals, the risk assessment process, decisions, the scope of the assessment and the way in which risk is conceptualised. This evaluation points to the need for dynamic models specifically designed to evaluate cloud risk. Our suggestions for future research are aimed at improving the identification, assessment, and mitigation of inter-dependent cloud risks inherent in a defined supply chain.
dcterms:isPartOf
n12:repository n19:ext-01674048
dcterms:subject
n7:QA n7:T n7:Q
bibo:authorList
n18:authors
bibo:volume
87