Normalization Framework for Vulnerability Risk Management in Cloud

V Ahmadi, P Arlos, E Casalicchio - 2021 8th International …, 2021 - ieeexplore.ieee.org
Vulnerability Risk Management (VRM) is a critical element in cloud security that directly
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …

Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud

A Nhlabatsi, A Hussein, R Fernandez… - … on Cyber Security …, 2019 - ieeexplore.ieee.org
In cloud computing, security risks posed to individual clients are different based on their
specific security requirements. In current practice, cloud providers usually apply generic …

Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing

R Patil, C Modi - The Journal of Supercomputing, 2019 - Springer
With the rapid growth of virtualization-based computing technologies, the demand of better
security for virtualization is increased. For cloud IaaS providers, it is important to offer …

Cloud computing vulnerabilities analysis

A Zamfiroiu, I Petre, R Boncea - … of the 2019 4th International Conference …, 2019 - dl.acm.org
Nowadays cloud computing technologies are the most widely used tools due to their great
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …

Multi-criteria decision making model for vulnerabilities assessment in cloud computing regarding common vulnerability scoring system

H Bolívar, HDJ Parada, O Roa… - … de Innovación y …, 2019 - ieeexplore.ieee.org
Vulnerability is associated with the probability of resistance of actions of a threat. A
vulnerability exists when a force of threat exceeds the capacity of resistance. Virtualization …

Security risk quantification mechanism for infrastructure as a service cloud computing platforms

D Fall, T Okuda, Y Kadobayashi… - Journal of Information …, 2015 - jstage.jst.go.jp
Cloud computing has revolutionized information technology, in that It allows enterprises and
users to lower computing expenses by outsourcing their needs to a cloud service provider …

Security Risk Assessment on Cloud: A Systematic Mapping Study

G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …

The Flaw Within: Identifying CVSS Score Discrepancies in the NVD

S Zhang, M Cai, M Zhang, L Zhao… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
Cloud security frameworks, like OpenSCAP, rely on vulnerability databases such as the
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …

Vulnerability prioritization: An offensive security approach

MF Bulut, A Adebayo, D Sow, S Ocepek - arXiv preprint arXiv:2206.11182, 2022 - arxiv.org
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …

Design a new protocol for vulnerability detection in cloud computing security improvement

N Mishra, RK Singh, SK Yadav - Proceedings of the International …, 2021 - papers.ssrn.com
Vulnerability attacks will result in breaches of security or desecration of the security policy of
the system resulting in information leakage or financial loss. While countless tracking …