2015
DOI: 10.3923/jas.2015.953.967
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling Approaches for Securing Cloud Computin

Abstract: A B S T R A C TThe cloud computing delivers services of processing data by using parallel and high computational processors virtually and remotely. This is very useful and beneficial to enterprises that have limitations in terms of processing resources, data storages and man power. However, one of the main challenge in cloud computing is data security. Supposed each user has an access to the domain based on the privilege given by the server. However, an attacker always has the opportunity to bypass the privile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(36 citation statements)
references
References 29 publications
(39 reference statements)
0
35
0
Order By: Relevance
“…There are different types of networks, and the research aspect for each of which encompasses improving the performance that is associated with the efficiency, flexibility, security and elasticity qualities [23], [24]. The routing optimization is a general problem in all network topologies.…”
Section: Resultsmentioning
confidence: 99%
“…There are different types of networks, and the research aspect for each of which encompasses improving the performance that is associated with the efficiency, flexibility, security and elasticity qualities [23], [24]. The routing optimization is a general problem in all network topologies.…”
Section: Resultsmentioning
confidence: 99%
“…1. Although DREAD is an asset-centric threat modelling approach, several of its application in the literature is in combination with STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege) model [8], [9], [10], [11], [12]. In this type of approach, the DREAD scoring scheme is used to identify the likelihood that an attack is able to exploit a particular threat.…”
Section: A Dreadmentioning
confidence: 99%
“…Security Target describes TOE by threats, security objectives, SFRs, SARs, and TOE security functions that occur in TOE [22][23][24][25].…”
Section: Eal2 Analysis and Requirementsmentioning
confidence: 99%