2013 IEEE 7th International Conference on Software Security and Reliability 2013
DOI: 10.1109/sere.2013.31
|View full text |Cite
|
Sign up to set email alerts
|

VULCAN: Vulnerability Assessment Framework for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…Security provided by various CSPs can be evaluated by different methods like security level agreements, generating knowledge bases to assess threats confronted by Cloud assets, or developing security service‐level agreements and individually analyzing the trust of different Cloud providers . These methods are able to identify the security threats and their countermeasures present on a CSP, but do not answer how relevant they will be to a particular client's application.…”
Section: Proposed Cloud Migration Frameworkmentioning
confidence: 99%
“…Security provided by various CSPs can be evaluated by different methods like security level agreements, generating knowledge bases to assess threats confronted by Cloud assets, or developing security service‐level agreements and individually analyzing the trust of different Cloud providers . These methods are able to identify the security threats and their countermeasures present on a CSP, but do not answer how relevant they will be to a particular client's application.…”
Section: Proposed Cloud Migration Frameworkmentioning
confidence: 99%
“…Similarly, [62] presents a model built to conduct penetration testing of cloud computing system vulnerabilities, including the platform and infrastructure, and [87] presents a model for conducting penetration testing of desktop applications and targets the most common desktop application vulnerabilities. These findings show that each technology is unique, which requires the construction of a specific model to conduct penetration testing.…”
Section: Rq3: What Are Models Are Available For Penetration Testing and How Can We Classify Them?mentioning
confidence: 99%
“…They ran a penetration test against the snapshot using a cluster of three different memory size Ubuntu VMs. An automated risk assessment framework (Nemesis) is presented in [38], involving vulnerability assessment by using their previous work [39]. To evaluate their approach, a cloud environment and its services are designed using OpenStack, applying the framework on 10 IT products.…”
Section: ) Mobile Testingmentioning
confidence: 99%
“…First they aim to determine the vulnerabilities of Ubuntu Server with the OpenStack node; second they aim to determine the vulnerabilities of cloud instances with different operating systems. A prototype framework for vulnerability assessment in cloud systems is presented in [39] and [41], with one example about developing an automated process for their proposed approach. Security validation as a service is presented in [42], with two hosts providing the proposed service to two midsize business processes, repeating the requests every 15 minutes for security validation.…”
Section: ) Mobile Testingmentioning
confidence: 99%