2018
DOI: 10.19101/ijatee.2018.c02
|View full text |Cite
|
Sign up to set email alerts
|

Modular responsibility distribution for vulnerability management process

Abstract: The world of computing rapidly changed from mainframe to client server architecture and towards the new world of cloud computing. This new generation of computing has tremendous advantages over traditional offerings. Irrespective of all, security is one of the biggest hurdles which hold the migration of business towards cloud. Main reason is client unawareness about the security counters and their roles. Security control can be normally implemented around three levels such as vulnerability, attack and threat. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 6 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?