Links

Tools

Export citation

Search in Google Scholar

Additional file 1 of A risk assessment model for selecting cloud service providers

This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Question mark in circle
Preprint: policy unknown
Question mark in circle
Postprint: policy unknown
Question mark in circle
Published version: policy unknown

Abstract

Mapping CAIQ questions to vulnerabilities. This file contains a table representing an example mapping r mk of CAIQ questions to ENISA vulnerabilities (see Section The vulnerability parameter for a CSP). This is the full version of the mapping provided in Table 6. (XLSX 16.6 kb)