2016
DOI: 10.1007/978-3-319-51966-1_20
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling for Cloud Data Center Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…The preliminary version of this paper has previously appeared in [6]. In this paper, we have substantially improved and extended the previous version.…”
Section: Introductionmentioning
confidence: 94%
“…The preliminary version of this paper has previously appeared in [6]. In this paper, we have substantially improved and extended the previous version.…”
Section: Introductionmentioning
confidence: 94%
“…The Cloud reference architecture is intended to be a simplified representation of the key components that are important for CAVs. It is sufficiently detailed for an analysis of how attacks on the Cloud will impact a CAV, however, more detailed reference architectures and threat models should be used to analyse the Cloud in greater depth (such as References [64][65][66]).…”
Section: Cloud Reference Architecturementioning
confidence: 99%
“…The problem with many approaches is the lack of formalization, which leads to their ambiguous interpretation and subjectivity of the resulting list of threats. There are works that use the mathematical apparatus of graph theory, but they are aimed at formalizing the description of attacks, not threats themselves [25][26][27]. Some works are aimed at the description of attackers and does not allow to determine the list of threats [28].…”
Section: Related Workmentioning
confidence: 99%