Normalization Framework for Vulnerability Risk Management in Cloud
Vulnerability Risk Management (VRM) is a critical element in cloud security that directly
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …
Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud
In cloud computing, security risks posed to individual clients are different based on their
specific security requirements. In current practice, cloud providers usually apply generic …
specific security requirements. In current practice, cloud providers usually apply generic …
Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing
With the rapid growth of virtualization-based computing technologies, the demand of better
security for virtualization is increased. For cloud IaaS providers, it is important to offer …
security for virtualization is increased. For cloud IaaS providers, it is important to offer …
Cloud computing vulnerabilities analysis
Nowadays cloud computing technologies are the most widely used tools due to their great
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …
Multi-criteria decision making model for vulnerabilities assessment in cloud computing regarding common vulnerability scoring system
H Bolívar, HDJ Parada, O Roa… - … de Innovación y …, 2019 - ieeexplore.ieee.org
Vulnerability is associated with the probability of resistance of actions of a threat. A
vulnerability exists when a force of threat exceeds the capacity of resistance. Virtualization …
vulnerability exists when a force of threat exceeds the capacity of resistance. Virtualization …
Security risk quantification mechanism for infrastructure as a service cloud computing platforms
D Fall, T Okuda, Y Kadobayashi… - Journal of Information …, 2015 - jstage.jst.go.jp
Cloud computing has revolutionized information technology, in that It allows enterprises and
users to lower computing expenses by outsourcing their needs to a cloud service provider …
users to lower computing expenses by outsourcing their needs to a cloud service provider …
Security Risk Assessment on Cloud: A Systematic Mapping Study
G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …
efficiency and agility. However, security challenges such as data loss and downtime …
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD
Cloud security frameworks, like OpenSCAP, rely on vulnerability databases such as the
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …
Vulnerability prioritization: An offensive security approach
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
Design a new protocol for vulnerability detection in cloud computing security improvement
Vulnerability attacks will result in breaches of security or desecration of the security policy of
the system resulting in information leakage or financial loss. While countless tracking …
the system resulting in information leakage or financial loss. While countless tracking …