Design and Implementation of a Threat-Specific Security Risk Assessment Tool

A Nhlabatsi, A Hussein, N Fetais… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Security threats posed to individual cloud computing clients vary depending on their specific
security requirements. However, Cloud Providers apply generic security risk assessment …

Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud

A Nhlabatsi, A Hussein, R Fernandez… - … on Cyber Security …, 2019 - ieeexplore.ieee.org
In cloud computing, security risks posed to individual clients are different based on their
specific security requirements. In current practice, cloud providers usually apply generic …

Spiral^ SRA: a threat-specific security risk assessment framework for the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Software Quality …, 2018 - ieeexplore.ieee.org
Conventional security risk assessment approaches for cloud infrastructures do not explicitly
consider risk with respect to specific threats. This is a challenge for a cloud provider because …

Threat modeling and analysis for the cloud ecosystem

S Manzoor, H Zhang, N Suri - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also
grows. The process of threat modeling and analysis is advocated to assess potential …

Security risk quantification mechanism for infrastructure as a service cloud computing platforms

D Fall, T Okuda, Y Kadobayashi… - Journal of Information …, 2015 - jstage.jst.go.jp
Cloud computing has revolutionized information technology, in that It allows enterprises and
users to lower computing expenses by outsourcing their needs to a cloud service provider …

Threat modeling for cloud infrastructures

N Alhebaishi, L Wang, A Singhal - EAI Endorsed Transactions …, 2018 - publications.eai.eu
Today's businesses are increasingly relying on the cloud as an alternative IT solution due to
its flexibility and lower cost. Compared to traditional enterprise networks, a cloud …

Security Risk Assessment on Cloud: A Systematic Mapping Study

G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …

Threat-specific security risk evaluation in the cloud

A Nhlabatsi, JB Hong, DS Kim… - … on Cloud Computing, 2018 - ieeexplore.ieee.org
Existing security risk evaluation approaches (eg, asset-based) do not consider specific
security requirements of individual cloud computing clients in the security risk evaluation. In …

A Continuous Risk Assessment Methodology for Cloud Infrastructures

I Kunz, A Schneider, C Banse - 2022 22nd IEEE International …, 2022 - ieeexplore.ieee.org
Cloud systems are dynamic environments which make it difficult to keep track of security
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …

[PDF][PDF] Secure cloud architecture

K Munir, S Palaniappan - Advanced Computing, 2013 - academia.edu
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing …