Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2016
DOI: 10.5121/csit.2016.60120
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Cloud Privacy Threat Modeling

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Various type of threat modelling which were identified in this study include Attack Tree (AT), Attack Graph (AG),Attack Surface (AS), Practical Threat Analysis (PTA) , Threat Model Framework for Personal Network (PN), STRIDE, Threat modeling in pervasive computing paradigm (TMP), [6], [14], [26]- [29], [50] and LINDDUN (Likability, Identifiability, Non-Repudiation, Detectability, Disclosure of Information, Unawareness and Non-Compliance) [30] as defined below:…”
Section: Healthcare Related Information Security Threats Threat Mmentioning
confidence: 99%
See 2 more Smart Citations
“…Various type of threat modelling which were identified in this study include Attack Tree (AT), Attack Graph (AG),Attack Surface (AS), Practical Threat Analysis (PTA) , Threat Model Framework for Personal Network (PN), STRIDE, Threat modeling in pervasive computing paradigm (TMP), [6], [14], [26]- [29], [50] and LINDDUN (Likability, Identifiability, Non-Repudiation, Detectability, Disclosure of Information, Unawareness and Non-Compliance) [30] as defined below:…”
Section: Healthcare Related Information Security Threats Threat Mmentioning
confidence: 99%
“…In the area of privacy, the LINDDUN (Likability, Identifiability, Non-Repudiation, Detectability, Disclosure of Information, Unawareness and Non-Compliance) privacy threat modeling framework has recently gained attention in the privacy community [30]. LINDDUN provides systematic support to elicit and mitigate privacy threats.…”
Section: Healthcare Related Information Security Threats Threat Mmentioning
confidence: 99%
See 1 more Smart Citation
“…A threat model is defined as a framework which details internal and external vulnerabilities, as well as objectives and countermeasures [22]. Threat models are utilized across various disciplines such as cloud computing [23], health records [24], and storage [25]. Threat model for a multi-modal system such as VRLE can provide a systematic analysis of possible threats and help identify any module that is highly vulnerable to attacks.…”
Section: A Threat Modelmentioning
confidence: 99%
“…In [54], the design and implementation of a security framework for BiobankCloud, a platform that supports the secure storage and processing of genomic data in cloud computing environments, has been discussed. The proposed framework is built on the cloud privacy threat modeling approach [55], [56] which is used to define the privacy threat model for processing next-generation sequencing data according to the DPD [2].…”
Section: Privacy-preservation For Sensitive Data In Cloud Computingmentioning
confidence: 99%