Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform
暂无分享,去创建一个
[1] Dong Seong Kim,et al. Cyber security analysis using attack countermeasure trees , 2010, CSIIRW '10.
[2] M. Brian Blake,et al. Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.
[3] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[4] Rubén S. Montero,et al. Key Challenges in Cloud Computing: Enabling the Future Internet of Services , 2013, IEEE Internet Computing.
[5] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[6] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[7] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[8] Shin-Jer Yang. Using SLA Strategy to Design an SOC Platform in Data Center on the Cloud Computing , 2013 .
[9] Ping Wang,et al. Threat risk analysis for cloud security based on Attack-Defense Trees , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).