Design and Implementation of a Threat-Specific Security Risk Assessment Tool
Security threats posed to individual cloud computing clients vary depending on their specific
security requirements. However, Cloud Providers apply generic security risk assessment …
security requirements. However, Cloud Providers apply generic security risk assessment …
Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud
In cloud computing, security risks posed to individual clients are different based on their
specific security requirements. In current practice, cloud providers usually apply generic …
specific security requirements. In current practice, cloud providers usually apply generic …
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
Conventional security risk assessment approaches for cloud infrastructures do not explicitly
consider risk with respect to specific threats. This is a challenge for a cloud provider because …
consider risk with respect to specific threats. This is a challenge for a cloud provider because …
Threat modeling and analysis for the cloud ecosystem
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also
grows. The process of threat modeling and analysis is advocated to assess potential …
grows. The process of threat modeling and analysis is advocated to assess potential …
Security risk quantification mechanism for infrastructure as a service cloud computing platforms
D Fall, T Okuda, Y Kadobayashi… - Journal of Information …, 2015 - jstage.jst.go.jp
Cloud computing has revolutionized information technology, in that It allows enterprises and
users to lower computing expenses by outsourcing their needs to a cloud service provider …
users to lower computing expenses by outsourcing their needs to a cloud service provider …
Threat modeling for cloud infrastructures
N Alhebaishi, L Wang, A Singhal - EAI Endorsed Transactions …, 2018 - publications.eai.eu
Today's businesses are increasingly relying on the cloud as an alternative IT solution due to
its flexibility and lower cost. Compared to traditional enterprise networks, a cloud …
its flexibility and lower cost. Compared to traditional enterprise networks, a cloud …
Security Risk Assessment on Cloud: A Systematic Mapping Study
G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …
efficiency and agility. However, security challenges such as data loss and downtime …
Threat-specific security risk evaluation in the cloud
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …
security requirements of individual cloud computing clients in the security risk evaluation. In …
A Continuous Risk Assessment Methodology for Cloud Infrastructures
Cloud systems are dynamic environments which make it difficult to keep track of security
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …
[PDF][PDF] Secure cloud architecture
K Munir, S Palaniappan - Advanced Computing, 2013 - academia.edu
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing …
services are delivered from data centers located throughout the world. Cloud computing …