2023
DOI: 10.1109/tcc.2021.3097770
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying Satisfaction of Security Requirements of Cloud Software Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…One of the main concerns in the new scenarios of blockchain is its security and risks of attacks. For evaluating the risks of static defensive strategy, there are a vast array of suitable methods in the literature, such as epistemological analysis [31], attack graph, artificial intelligence [32], entailment relationships-based methods [33], vulnerability evaluation [34]. In view of the difficulty with the Internet-of-Things (IoT) environment of assessing risk quantitatively due to uncontrollable risks in complex systems, Radanliev et al [31] proposed a set of methods based on epistemological analysis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the main concerns in the new scenarios of blockchain is its security and risks of attacks. For evaluating the risks of static defensive strategy, there are a vast array of suitable methods in the literature, such as epistemological analysis [31], attack graph, artificial intelligence [32], entailment relationships-based methods [33], vulnerability evaluation [34]. In view of the difficulty with the Internet-of-Things (IoT) environment of assessing risk quantitatively due to uncontrollable risks in complex systems, Radanliev et al [31] proposed a set of methods based on epistemological analysis.…”
Section: Related Workmentioning
confidence: 99%
“…It also provides a transformation roadmap for the existing various risk assessment methods in different systems. Nhlabatsi et al [33] extended the entailment relationships from the field of requirements engineering in terms of the ability to describe information security. An evaluation method is proposed, which is based on relationships between defense strength, the exploitability of vulnerabilities, and attack severity.…”
Section: Related Workmentioning
confidence: 99%