2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726854
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for ranking cloud system vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Therefore, they face many problems in dealing with risk and recovery. Moreover, dependents need more extra services for safety; thus, the presence of a large number of dependents in an area may put more constraints on existing services which in turn is a factor in increasing vulnerability [ 26 , 44 , 54 ].…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, they face many problems in dealing with risk and recovery. Moreover, dependents need more extra services for safety; thus, the presence of a large number of dependents in an area may put more constraints on existing services which in turn is a factor in increasing vulnerability [ 26 , 44 , 54 ].…”
Section: Methodsmentioning
confidence: 99%
“…Kamongi et al [16] proposed a method of ranking cloud system vulnerability and implemented it with vulnerability discovery on a cloud web application: the result was a list of ranked vulnerabilities associated with an attack path. They conceptualized cloud vulnerabilities as the attack paths from a pre-generated attack graph.…”
Section: Fuzzy Logic and Related Workmentioning
confidence: 99%