封面
声明
英文摘要
中文摘要
目录
LIST OF FIGURES
LIST OF TABLES
Chapter 1. I N T R O D U C T I O N
1.1. Motivation
1.2. Thesis Contribution and Organization
C h a p t e r 2 . B A C K G R O U N D A N D L I T E R A T U R E R E V I E W O F R E L A T E D W O R K S
2.1. Information Security Risk Management \(ISRM\)
2.2. Cloud Computing Security
2.3. Summary
C h a p t e r 3 . M E T H O D O L O G Y
3.1. Background
3.2. Problems statement
3.3. Overview of the research approach
C h a p t e r 4 . R I S K A W A R E F R A M E W O R K
4.1. RAFCE Process
4.2. Description of the approach
C h a p t e r 5 . S I M U L A T I O N , E V A L U A T I O N ,
5.1. Simulation
5.2. Evaluation
5.3. Limitation
C h a p t e r 6 . C O N C L U S I O N
参考文献
A B B R E V I A T I O N S
A P P E N D I X
致谢