2019
DOI: 10.1016/j.array.2019.100011
|View full text |Cite
|
Sign up to set email alerts
|

A survey on vulnerability assessment tools and databases for cloud-based web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…This database allows to search for necessary information concerning prebiotics and their activity by definite parameters. The advantage of using MS Office Access 2013 is its integration into desktop PCs, ability to export and convert data, and a wide range generation of forms, reports, and queries which can be used to sort data and enter it in a convenient manner [56]. This data structure is unique, as it contains information about the assessment of prebiotic activities in vitro and the different methods used to define them.…”
Section: Discussionmentioning
confidence: 99%
“…This database allows to search for necessary information concerning prebiotics and their activity by definite parameters. The advantage of using MS Office Access 2013 is its integration into desktop PCs, ability to export and convert data, and a wide range generation of forms, reports, and queries which can be used to sort data and enter it in a convenient manner [56]. This data structure is unique, as it contains information about the assessment of prebiotic activities in vitro and the different methods used to define them.…”
Section: Discussionmentioning
confidence: 99%
“…The 3-4-5 reference model of Cloud can be stated as follows: The purpose of this article is to help identify those points in the application lifecycle when vulnerability scanning may be done and to provide useful information for better protecting cloud applications. Finally, this paper analyses and shows that orchestration of vulnerability scanning tools can help to increase vulnerability detection coverage [6]. The author's major objective in [7] is to provide an answer to the topic of how to evaluate vulnerabilities in cloud computing and what the most common penetration testing techniques are in cloud settings.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from the generic quality criteria that vulnerabilities inherit form being actionable cyber threat intelligence items, they also have their own, esoteric ones. The authors in [7] list two main categories that a vulnerabilities database (or dataset) should cover, namely information coverage and capabilities. In terms of the former, the evaluation criteria cover the scope, impact & risk, resolution, vendor, products, exploit, categorisation, and relations.…”
Section: The Emerging Ecosystem Of Software Vulnerabilitiesmentioning
confidence: 99%