2010 IEEE 7th International Conference on E-Business Engineering 2010
DOI: 10.1109/icebe.2010.77
|View full text |Cite
|
Sign up to set email alerts
|

Analysis on Cloud-Based Security Vulnerability Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 2 publications
0
19
0
2
Order By: Relevance
“…Moreover, massive attacks may compromise virtual firewall if they originate from outside the virtual domain [59]. The virtual firewall side effect can be mitigated if a proper firewall is designed among virtual machines and suitable firewall policies are defined [51]. Table 1 indicates the two approaches discussed regarding firewall systems administration in IaaS, which are centralised and distributed.…”
Section: Iaas Firewall Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, massive attacks may compromise virtual firewall if they originate from outside the virtual domain [59]. The virtual firewall side effect can be mitigated if a proper firewall is designed among virtual machines and suitable firewall policies are defined [51]. Table 1 indicates the two approaches discussed regarding firewall systems administration in IaaS, which are centralised and distributed.…”
Section: Iaas Firewall Approachesmentioning
confidence: 99%
“…Therefore, the firewall policy management area is an evolving research field, as policy correctness and consistency among firewall systems is an essential element for enhancing firewall security [49,50]. To get a cloud firewall policy configuration pattern, intensive experiments are needed to make security policy complete [51]. Therefore, several researchers are concerned with improving firewall policy strategies; for example, the Tree-Rule firewall, which uses the NF-IP-FORWARD algorithm to improve the performance of firewalls in cloud policy configurations [52].…”
Section: B Iaas Firewall Security Threats and Limitationsmentioning
confidence: 99%
“…Another vulnerability assessment approach [46], applies three different scenarios to explain how the cloud affects the security vulnerability. A model-driven approach is shown in [47] to facilitate the creation of security configurations.…”
Section: ) Mobile Testingmentioning
confidence: 99%
“…Huan, et al, [4] investigate the different security vulnerability assessment methods for cloud environments. Experiments show that more vulnerabilities are detected if vulnerable tools and servers are in the same LAN.…”
Section: Copyright ⓒ 2015 Serscmentioning
confidence: 99%