2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) 2018
DOI: 10.1109/aina.2018.00114
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cloud Storage Brokerage Systems Through Threat Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…We extended our previous works on threat modeling and proactive risk analysis for cloud infrastructure, where we used the CVSS version 2 to score vulnerabilities in cloud infrastructure [34], [35]. The CVSS metrics are expressed using with base scores, which are numeric representations of risks, assessed in terms of severity [36], [37].…”
Section: ) Cvssmentioning
confidence: 99%
“…We extended our previous works on threat modeling and proactive risk analysis for cloud infrastructure, where we used the CVSS version 2 to score vulnerabilities in cloud infrastructure [34], [35]. The CVSS metrics are expressed using with base scores, which are numeric representations of risks, assessed in terms of severity [36], [37].…”
Section: ) Cvssmentioning
confidence: 99%
“…1) CVSS: We extended our previous works on threat modeling and proactive risk analysis for cloud infrastructure, where we used the CVSS version 2 to score vulnerabilities in cloud infrastructure [32], [33]. The CVSS metrics are expressed using with base scores, which are numeric representations of risks, assessed in terms of severity [34], [35].…”
Section: B Security Risk Metricsmentioning
confidence: 99%
“…2) Deriving Security Metrics with CVSS: Let us consider how to compute security severity using the CVSS for two representative cloud attacks: Cloud Storage Enumeration Attack and Cloud Storage Exploitation Attack [32], [33], [37].…”
Section: B Security Risk Metricsmentioning
confidence: 99%
“…Let us consider how to compute security severity using the CVSS for three representative cloud attacks: Cloud Storage Enumeration Attack, Cloud Storage Exploitation Attack [57,56,9] and Credential Report Abuse. [14], to construct possible keywords that are relevant to the target e.g.…”
Section: Deriving Security Metrics With Cvssmentioning
confidence: 99%