Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/epsec/DuncanWJZ15
%A Duncan, Bob
%A Whittington, Mark
%A Jaatun, Martin Gilje
%A Zúñiga, Alfredo Ramiro Reyes
%B ES
%D 2015
%E Chang, Victor
%E Ramachandran, Muthu
%E Walters, Robert John
%E Wills, Gary B.
%I Springer
%K dblp
%P 19-39
%T Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
%U http://dblp.uni-trier.de/db/conf/epsec/epsec2015.html#DuncanWJZ15
%V 10131
%@ 978-3-319-54379-6
@inproceedings{conf/epsec/DuncanWJZ15,
added-at = {2017-05-17T00:00:00.000+0200},
author = {Duncan, Bob and Whittington, Mark and Jaatun, Martin Gilje and Zúñiga, Alfredo Ramiro Reyes},
biburl = {https://www.bibsonomy.org/bibtex/2136a1bba244817127e37cb048170a1f3/dblp},
booktitle = {ES},
crossref = {conf/epsec/2015},
editor = {Chang, Victor and Ramachandran, Muthu and Walters, Robert John and Wills, Gary B.},
ee = {https://doi.org/10.1007/978-3-319-54380-2_2},
interhash = {c7279fcdc3f72a6ae1d7491d06a45f31},
intrahash = {136a1bba244817127e37cb048170a1f3},
isbn = {978-3-319-54379-6},
keywords = {dblp},
pages = {19-39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2020-09-30T11:48:23.000+0200},
title = {Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?},
url = {http://dblp.uni-trier.de/db/conf/epsec/epsec2015.html#DuncanWJZ15},
volume = 10131,
year = 2015
}