2014 IEEE World Congress on Services 2014
DOI: 10.1109/services.2014.20
|View full text |Cite
|
Sign up to set email alerts
|

Off-Line Risk Assessment of Cloud Service Provider

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Nevertheless, these authors fail to consider that the vulnerabilities, normally varying with each application, have a strong influence on the effectiveness of applied security countermeasures. Sen and Madria propose an off-line risk assessment framework in [5] to evaluate the security level of an application for a specific CSP. They first identify the threats for a given application and estimate how much risk can be mitigated with the CSP's infrastructures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, these authors fail to consider that the vulnerabilities, normally varying with each application, have a strong influence on the effectiveness of applied security countermeasures. Sen and Madria propose an off-line risk assessment framework in [5] to evaluate the security level of an application for a specific CSP. They first identify the threats for a given application and estimate how much risk can be mitigated with the CSP's infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…There are studies proposing methodologies to assess the security levels provided by digital infrastructures, e.g. clouds [3][4][5]. These works only estimate the total security strength provided by the infrastructures according to the applied security countermeasures.…”
Section: Introductionmentioning
confidence: 99%
“…This concept is coined as Security Coverage and has been formally established in Section 2.3. For detailed information on modules 1 and 2 of the offline risk assessment framework, readers are kindly referred to Reference .…”
Section: Cloud Migration Scenarios and Algorithm Designmentioning
confidence: 99%
“…A cloud user does not manage or control the underlying cloud infrastructure , but providers install and operate the application software. Example providers for this service include Salesforce, Facebook, and Google Apps .…”
Section: Problem Definitionmentioning
confidence: 99%