43rd Annual 2009 International Carnahan Conference on Security Technology 2009
DOI: 10.1109/ccst.2009.5335550
|View full text |Cite
|
Sign up to set email alerts
|

Threat modeling for virtual directory services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…ANOA [41] is a generic framework to define and analyze anonymity of communication networks, while the frameworks presented in [38,50] target the secure design of data routing protocols. Finally, other works build specialized threat models for specific classes of distributed systems, e.g., storage systems [48], virtual directory services [44], and unmanned aerial vehicle systems [52], rather than introducing a framework.…”
Section: Related Workmentioning
confidence: 99%
“…ANOA [41] is a generic framework to define and analyze anonymity of communication networks, while the frameworks presented in [38,50] target the secure design of data routing protocols. Finally, other works build specialized threat models for specific classes of distributed systems, e.g., storage systems [48], virtual directory services [44], and unmanned aerial vehicle systems [52], rather than introducing a framework.…”
Section: Related Workmentioning
confidence: 99%
“…Attacks on directory services and virtual directories can range from simply stealing information from a directory to more complicated attacks [1,3]. However, little work has been done to address attacks specific to VDS.…”
Section: Introductionmentioning
confidence: 98%
“…However, little work has been done to address attacks specific to VDS. The first attempt to address this subject appears in [3], where four specific attack models are outlined: authentication attacks, c 2010 Association for Computing Machinery. ACM acknowledges that this contribution was authored or coauthored by a contractor or affiliate of the U.S. Government.…”
Section: Introductionmentioning
confidence: 99%