A review of penetration testing and vulnerability assessment in cloud environment
I Yurtseven, S Bagriyanik - 2020 Turkish National Software …, 2020 - ieeexplore.ieee.org
Cloud computing continues to provide easy, flexible, and cost-effective solutions and
services to both enterprises and unprofessional users. Many small and large-scale …
services to both enterprises and unprofessional users. Many small and large-scale …
Securing cloud application infrastructure: understanding the penetration testing challenges of IaaS, PaaS, and SaaS environments
AS George, S Sagayarajan - Partners Universal International Research …, 2023 - puirj.com
Cloud computing is rapidly becoming the go-to platform for businesses of all sizes, from
startups to large enterprises. With this shift comes a responsibility to ensure that cloud …
startups to large enterprises. With this shift comes a responsibility to ensure that cloud …
A methodology for automated penetration testing of cloud applications
Security assessment is a very time-and money-consuming activity. It needs specialised
security skills and, furthermore, it is not fully integrated into the software development life …
security skills and, furthermore, it is not fully integrated into the software development life …
Cloud computing vulnerabilities analysis
Nowadays cloud computing technologies are the most widely used tools due to their great
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …
A novel framework to carry out cloud penetration test
J Hu, C Tang - International journal of computer network and …, 2011 - search.proquest.com
Abstract in current cloud services, users put their data and resources into the cloud so as to
enjoy the on-demand high quality applications and services. Different from the conventional …
enjoy the on-demand high quality applications and services. Different from the conventional …
Towards automated penetration testing for cloud applications
The development of cloud applications raises several security concerns due to the lack of
control over involved resources. Security testing is fundamental to identify the existing …
control over involved resources. Security testing is fundamental to identify the existing …
Vulnerability prioritization: An offensive security approach
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
A comprehensive survey on security in cloud computing
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …
to increase by 42%. According to another research, the IT security expenditure had …
A comprehensive survey on security in cloud computing
G Ramachandra, M Iftikhar, FA Khan - Procedia Computer Science, 2017 - Elsevier
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …
to increase by 42%. According to another research, the IT security expenditure had …
Security as a service for public cloud tenants (SaaS)
Cloud computing is a novel paradigm that is known for its elasticity and diversity in terms of
the services provided to the end users. Although these services offer many benefits such as …
the services provided to the end users. Although these services offer many benefits such as …