منابع مشابه
Threat Modeling for Cloud Data Center Infrastructures
Cloud computing has undergone rapid expansion throughout the last decade. Many companies and organizations have made the transition from tra ditional data centers to the cloud due to its flexibility and lower cost. However, traditional data centers are still being relied upon by those who are less certain about the security of cloud. This problem is highlighted by the fact that there only exis...
متن کاملAdvanced Cloud Privacy Threat Modeling
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) metho...
متن کاملCommunication Infrastructures for Cloud Computing
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The vi...
متن کاملDesign and implementation of the advanced cloud privacy threat modeling
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) metho...
متن کاملService Provisioning for Lightweight Community Cloud Infrastructures
Service provision in low power network environments remains a very difficult task due to the lightweight nature of the devices involved. This paper explores and demonstrates the efficacy of the light weight resource allocation protocol (LRAP) in allocating services in a heterogeneous network environment consisting of primarily low power nodes. We show that with the correct resource brokering ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Security and Safety
سال: 2019
ISSN: 2032-9393
DOI: 10.4108/eai.10-1-2019.156246