-
1
-
-
85009505710
-
-
National vulnerability database, Accessed 20 Feb 2015
-
National vulnerability database. http://www.nvd.org. Accessed 20 Feb 2015
-
-
-
-
2
-
-
85009452462
-
-
National Institute of Standards and Technology: Cloud Computing Service Metrics Description, Accessed 17 June 2015
-
National Institute of Standards and Technology: Cloud Computing Service Metrics Description (2015). http://www.nist.gov/itl/cloud/upload/RATAXCloudServiceMetricsDescription-DRAFT-20141111.pdf. Accessed 17 June 2015
-
(2015)
-
-
-
3
-
-
85009455259
-
-
Google Compute Engine Performance Test with RightScale and Apica, Accessed 26 March 2016
-
Adler, B.: Google Compute Engine Performance Test with RightScale and Apica (2013). http://www.rightscale.com/blog/cloud-industry-insights/google-computeengine-performance-test-rightscale-and-apica. Accessed 26 March 2016
-
(2013)
-
-
Adler, B.1
-
4
-
-
85009458310
-
-
Cisco cloud computing-data center strategy, architecture, and solutions
-
Bakshi, K.: Cisco cloud computing-data center strategy, architecture, and solutions (2009). http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputingWP.pdf
-
(2009)
-
-
Bakshi, K.1
-
5
-
-
85009513792
-
-
Building three-tier architectures with security groups, Accessed 28 March 2016
-
Barr, J.: Building three-tier architectures with security groups (2010). https://aws.amazon.com/blogs/aws/building-three-tier-architectures-with-security-groups/. Accessed 28 March 2016
-
(2010)
-
-
Barr, J.1
-
6
-
-
79957992460
-
A survey of risks, threats and vulnerabilities in cloud computing
-
ISWSA 2011, New York, NY, USA, ACM
-
Dahbur, K., Mohammad, B., Tarakji, A.B.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, ISWSA 2011, New York, NY, USA, pp. 12: 1-12: 6. ACM (2011)
-
(2011)
Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications
, pp. 1-12
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
7
-
-
84860771661
-
Optimal security hardening on attack tree models of networks: A cost-benefit analysis
-
Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167-188 (2012)
-
(2012)
Int. J. Inf. Secur
, vol.11
, Issue.3
, pp. 167-188
-
-
Dewri, R.1
Ray, I.2
Poolsappasit, N.3
Whitley, D.4
-
8
-
-
35148896736
-
Using attack and protection trees to analyze threats and defenses to homeland security
-
Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: MILCOM 2006-2006 IEEE Military Communications conference, pp. 1-7, October 2006
-
(2006)
MILCOM 2006-2006 IEEE Military Communications Conference
, pp. 1-7
-
-
Edge, K.S.1
Dalton, G.C.2
Raines, R.A.3
Mills, R.F.4
-
9
-
-
51949085363
-
Measuring network security using Bayesian network-based attack graphs
-
Frigault, M., Wang, L.: Measuring network security using Bayesian network-based attack graphs. In: 32nd Annual IEEE International Computer Software and Applications, COMPSAC 2008, pp. 698-703, July 2008
-
(2008)
32Nd Annual IEEE International Computer Software and Applications, COMPSAC 2008
, pp. 698-703
-
-
Frigault, M.1
Wang, L.2
-
10
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50-57 (2011)
-
(2011)
IEEE Secur. Priv
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stöcker, E.3
-
12
-
-
85050515469
-
-
Accessed 05 Feb 2015
-
Hany, M.: VMware VSphere in the Enterprise. http://www.hypervizor.com/diags/HyperViZor-Diags-VMW-vS4-Enterprise-v1-0.pdf. Accessed 05 Feb 2015
-
Vmware Vsphere in the Enterprise
-
-
Hany, M.1
-
13
-
-
85139103856
-
Threat modeling the cloud computing, mobile device toting, consumerized enterprise-an overview of considerations
-
Ingalsbe, J.A., Shoemaker, D., Mead, N.R.: Threat modeling the cloud computing, mobile device toting, consumerized enterprise-an overview of considerations. In: AMCIS (2011)
-
(2011)
AMCIS
-
-
Ingalsbe, J.A.1
Shoemaker, D.2
Mead, N.R.3
-
14
-
-
80052459657
-
A security metrics framework for the cloud
-
Luna, J., Ghani, H., Germanus, D., Suri, N.: A security metrics framework for the cloud. In: 2011 Proceedings of the International Conference on Security and Cryptography (SECRYPT), pp. 245-250, July 2011
-
(2011)
Proceedings of the International Conference on Security and Cryptography (SECRYPT)
, pp. 245-250
-
-
Luna, J.1
Ghani, H.2
Germanus, D.3
Suri, N.4
-
16
-
-
33845524230
-
Common vulnerability scoring system
-
Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Priv. 4(6), 85-89 (2006)
-
(2006)
IEEE Secur. Priv
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
17
-
-
85009465799
-
-
Openstack. Openstack Operations Guide, Accessed 27 Aug 2015
-
Openstack. Openstack Operations Guide. http://docs.openstack.org/openstackops/content/openstack-ops preface.html. Accessed 27 Aug 2015
-
-
-
-
18
-
-
33646031830
-
Using attack trees to identify malicious attacks from authorized insiders
-
Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005, Springer, Heidelberg
-
Ray, I., Poolsapassit, N.: Using attack trees to identify malicious attacks from authorized insiders. In: Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005). doi:10.1007/11555827_14
-
(2005)
LNCS
, vol.3679
, pp. 231-246
-
-
Ray, I.1
Poolsapassit, N.2
-
20
-
-
0002670359
-
Attack trees. Dr
-
Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21-29 (1999)
-
(1999)
Dobb’s J
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
22
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 273-284 (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
24
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
Atluri, V. (ed.) DBSec 2008, Springer, Heidelberg
-
Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283-296. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70567-3_22
-
(2008)
LNCS
, vol.5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
|