Threat Modeling for Cloud Infrastructures

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threat Modeling for Cloud Data Center Infrastructures

Cloud computing has undergone rapid expansion throughout the last decade. Many companies and organizations have made the transition from tra­ ditional data centers to the cloud due to its flexibility and lower cost. However, traditional data centers are still being relied upon by those who are less certain about the security of cloud. This problem is highlighted by the fact that there only exis...

متن کامل

Advanced Cloud Privacy Threat Modeling

Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) metho...

متن کامل

Communication Infrastructures for Cloud Computing

Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The vi...

متن کامل

Design and implementation of the advanced cloud privacy threat modeling

Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) metho...

متن کامل

Service Provisioning for Lightweight Community Cloud Infrastructures

Service provision in low power network environments remains a very difficult task due to the lightweight nature of the devices involved. This paper explores and demonstrates the efficacy of the light weight resource allocation protocol (LRAP) in allocating services in a heterogeneous network environment consisting of primarily low power nodes. We show that with the correct resource brokering ap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ICST Transactions on Security and Safety

سال: 2019

ISSN: 2032-9393

DOI: 10.4108/eai.10-1-2019.156246