메뉴 건너뛰기




Volumn , Issue , 2010, Pages 93-102

Security audits of multi-tier virtual infrastructures in public infrastructure clouds

Author keywords

Amazon EC2; Attack graphs; Cloud computing; Reachability

Indexed keywords

AMAZON EC2; ATTACK GRAPH; AUTOMATED ANALYSIS; CLOUD COMPUTING; CLOUD INFRASTRUCTURES; CLOUD SERVICES; END USERS; MULTI TIER ARCHITECTURE; MULTI-TIER; POLICY LANGUAGE; PUBLIC INFRASTRUCTURES; REACHABILITY; SECURITY ASSESSMENT; SECURITY AUDIT; SECURITY CHALLENGES; SECURITY INCIDENT; SECURITY RISKS; START-UPS; VIRTUAL INFRASTRUCTURES; WIDE SPECTRUM;

EID: 78650122895     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866835.1866853     Document Type: Conference Paper
Times cited : (71)

References (34)
  • 3
    • 78149305944 scopus 로고    scopus 로고
    • Available at last Accessed March 2010, 2010
    • AMAZON. The Amazon Elastic Compute Cloud (EC2) Available at http://aws.amazon.com/ec2/, last accessed March 2010, 2010.
    • The Amazon Elastic Compute Cloud (EC2)
  • 6
  • 10
    • 84890929497 scopus 로고    scopus 로고
    • Introduction to visualization for computer security
    • GOODALL, J. R. Introduction to Visualization for Computer Security. In VizSEC (2007), pp. 1-17.
    • (2007) VizSEC , pp. 1-17
    • Goodall, J.R.1
  • 12
    • 78650118210 scopus 로고    scopus 로고
    • World Scientific Press ch. Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response
    • JAJODIA, S., AND NOEL, S. Algorithms, Architectures, and Information Systems Security. World Scientific Press, 2007, ch. Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response.
    • (2007) Algorithms, Architectures, and Information Systems Security
    • Jajodia, S.1    Noel, S.2
  • 18
    • 78650151286 scopus 로고    scopus 로고
    • Available at last Accessed June 2010
    • NETWORKX DEVELOPERS. NetworkX. Available at http://networkx.lanl.gov/, last accessed June 2010, 2010.
    • (2010) NetworkX
  • 30
    • 78650159513 scopus 로고    scopus 로고
    • Available at last Accessed March 2010
    • TENABLE NETWORK SECURITY. Nessus, the Network Vulnerability Scanner. Available at http://www.nessus.org, last accessed March 2010, 2010.
    • (2010) Nessus, the Network Vulnerability Scanner
  • 32
    • 78650084931 scopus 로고    scopus 로고
    • An interactive attack graph cascade and reachability display
    • WILLIAMS, L., LIPPMANN, R., AND INGOLS, K. An Interactive Attack Graph Cascade and Reachability Display. In VizSEC (2007), pp. 221-236.
    • (2007) VizSEC , pp. 221-236
    • Williams, L.1    Lippmann, R.2    Ingols, K.3
  • 34
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • WOOL, A. A Quantitative Study of Firewall Configuration Errors. Computer 37, 6 (2004), 62-67.
    • (2004) Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.