2018
DOI: 10.1007/978-3-319-91764-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…A risk pattern is a sub-structure of a cloud system configuration, which threatens the protection of sensitive data and therefore has to be avoided [26]. A risk pattern can typically be divided into three parts (see Fig.…”
Section: Structure Of Risk Patternsmentioning
confidence: 99%
See 3 more Smart Citations
“…A risk pattern is a sub-structure of a cloud system configuration, which threatens the protection of sensitive data and therefore has to be avoided [26]. A risk pattern can typically be divided into three parts (see Fig.…”
Section: Structure Of Risk Patternsmentioning
confidence: 99%
“…From a graph-theoretic point of view, a risk pattern defines a path from an attacker to the sensitive data (the path through which the attacker may be able to access the data), plus an additional path between the same two vertices encoding that the data belong to a data subject who does not trust the attacker. This means that instead of a general graph pattern matching problem as suggested in [26], only subgraphs of very limited structure (cycle graphs) must be searched for in the cloud model, which may require significantly less computation.…”
Section: Characteristics Of Risk Patternsmentioning
confidence: 99%
See 2 more Smart Citations
“…To make sound adaptation decisions at run time, one needs a model of the system, its requirements and environment. The model must be available at run time to enable online reasoning, hence it is called model@runtime [4]. Data protection concerns relate to all layers of the cloud stack, including secure hardware capabilities, co-location of different tenants on the same server, encryption of communication between application components, and data anonymization.…”
Section: Run-time Data Protection Assurancementioning
confidence: 99%