메뉴 건너뛰기




Volumn 10128 LNCS, Issue , 2017, Pages 302-319

Threat modeling for cloud data center infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

FORESTRY; PLATFORM AS A SERVICE (PAAS);

EID: 85009446386     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-51966-1_20     Document Type: Conference Paper
Times cited : (22)

References (24)
  • 1
    • 85009505710 scopus 로고    scopus 로고
    • National vulnerability database, Accessed 20 Feb 2015
    • National vulnerability database. http://www.nvd.org. Accessed 20 Feb 2015
  • 2
    • 85009452462 scopus 로고    scopus 로고
    • National Institute of Standards and Technology: Cloud Computing Service Metrics Description, Accessed 17 June 2015
    • National Institute of Standards and Technology: Cloud Computing Service Metrics Description (2015). http://www.nist.gov/itl/cloud/upload/RATAXCloudServiceMetricsDescription-DRAFT-20141111.pdf. Accessed 17 June 2015
    • (2015)
  • 3
    • 85009455259 scopus 로고    scopus 로고
    • Google Compute Engine Performance Test with RightScale and Apica, Accessed 26 March 2016
    • Adler, B.: Google Compute Engine Performance Test with RightScale and Apica (2013). http://www.rightscale.com/blog/cloud-industry-insights/google-computeengine-performance-test-rightscale-and-apica. Accessed 26 March 2016
    • (2013)
    • Adler, B.1
  • 4
    • 85009458310 scopus 로고    scopus 로고
    • Cisco cloud computing-data center strategy, architecture, and solutions
    • Bakshi, K.: Cisco cloud computing-data center strategy, architecture, and solutions (2009). http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputingWP.pdf
    • (2009)
    • Bakshi, K.1
  • 5
    • 85009513792 scopus 로고    scopus 로고
    • Building three-tier architectures with security groups, Accessed 28 March 2016
    • Barr, J.: Building three-tier architectures with security groups (2010). https://aws.amazon.com/blogs/aws/building-three-tier-architectures-with-security-groups/. Accessed 28 March 2016
    • (2010)
    • Barr, J.1
  • 7
    • 84860771661 scopus 로고    scopus 로고
    • Optimal security hardening on attack tree models of networks: A cost-benefit analysis
    • Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167-188 (2012)
    • (2012) Int. J. Inf. Secur , vol.11 , Issue.3 , pp. 167-188
    • Dewri, R.1    Ray, I.2    Poolsappasit, N.3    Whitley, D.4
  • 10
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50-57 (2011)
    • (2011) IEEE Secur. Priv , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stöcker, E.3
  • 12
    • 85050515469 scopus 로고    scopus 로고
    • Accessed 05 Feb 2015
    • Hany, M.: VMware VSphere in the Enterprise. http://www.hypervizor.com/diags/HyperViZor-Diags-VMW-vS4-Enterprise-v1-0.pdf. Accessed 05 Feb 2015
    • Vmware Vsphere in the Enterprise
    • Hany, M.1
  • 13
    • 85139103856 scopus 로고    scopus 로고
    • Threat modeling the cloud computing, mobile device toting, consumerized enterprise-an overview of considerations
    • Ingalsbe, J.A., Shoemaker, D., Mead, N.R.: Threat modeling the cloud computing, mobile device toting, consumerized enterprise-an overview of considerations. In: AMCIS (2011)
    • (2011) AMCIS
    • Ingalsbe, J.A.1    Shoemaker, D.2    Mead, N.R.3
  • 15
  • 16
    • 33845524230 scopus 로고    scopus 로고
    • Common vulnerability scoring system
    • Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Priv. 4(6), 85-89 (2006)
    • (2006) IEEE Secur. Priv , vol.4 , Issue.6 , pp. 85-89
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 17
    • 85009465799 scopus 로고    scopus 로고
    • Openstack. Openstack Operations Guide, Accessed 27 Aug 2015
    • Openstack. Openstack Operations Guide. http://docs.openstack.org/openstackops/content/openstack-ops preface.html. Accessed 27 Aug 2015
  • 18
    • 33646031830 scopus 로고    scopus 로고
    • Using attack trees to identify malicious attacks from authorized insiders
    • Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005, Springer, Heidelberg
    • Ray, I., Poolsapassit, N.: Using attack trees to identify malicious attacks from authorized insiders. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005). doi:10.1007/11555827_14
    • (2005) LNCS , vol.3679 , pp. 231-246
    • Ray, I.1    Poolsapassit, N.2
  • 19
  • 20
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees. Dr
    • Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21-29 (1999)
    • (1999) Dobb’s J , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 24
    • 50249085983 scopus 로고    scopus 로고
    • An attack graph-based probabilistic security metric
    • Atluri, V. (ed.) DBSec 2008, Springer, Heidelberg
    • Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283-296. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70567-3_22
    • (2008) LNCS , vol.5094 , pp. 283-296
    • Wang, L.1    Islam, T.2    Long, T.3    Singhal, A.4    Jajodia, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.