Standard
Cloud Security Requirement Based Threat Analysis. / Taha, Ahmed; Lawall, Alexander
; Suri, Neeraj.
2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., 2023. p. 506-510 (2023 International Conference on Computing, Networking and Communications, ICNC 2023).
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Harvard
Taha, A, Lawall, A
& Suri, N 2023,
Cloud Security Requirement Based Threat Analysis. in
2023 International Conference on Computing, Networking and Communications, ICNC 2023. 2023 International Conference on Computing, Networking and Communications, ICNC 2023, Institute of Electrical and Electronics Engineers Inc., pp. 506-510, 2023 International Conference on Computing, Networking and Communications, ICNC 2023, Honolulu, United States,
20/02/23.
https://doi.org/10.1109/ICNC57223.2023.10074275
APA
Vancouver
Taha A, Lawall A
, Suri N.
Cloud Security Requirement Based Threat Analysis. In 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc. 2023. p. 506-510. (2023 International Conference on Computing, Networking and Communications, ICNC 2023). Epub 2023 Feb 20. doi: 10.1109/ICNC57223.2023.10074275
Author
Taha, Ahmed ; Lawall, Alexander
; Suri, Neeraj. /
Cloud Security Requirement Based Threat Analysis. 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., 2023. pp. 506-510 (2023 International Conference on Computing, Networking and Communications, ICNC 2023).
Bibtex
@inproceedings{28e21a133a9c4dcb9017375e6cca2f40,
title = "Cloud Security Requirement Based Threat Analysis",
abstract = "Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities systematically. Specifically, the TA, which focuses on threats that can potentially violate the customer's data ownership requirements of security and performance, is named Requirement Based Threat Analysis (RBTA). Despite the importance of RBTA, the current manual RBTA process is both time intensive and makes no assurance of completeness of the analysis. Thus, we develop a systematic analytic technique that enumerates customers' requirements and then determines all possible direct/indirect dependencies across them to conduct a generalized threat analysis from their requirements. The approach is validated for its effectiveness on actual Cloud customer requirements and can be generalized to apply to other requirements.",
keywords = "Cloud Security, Service's dependencies, Threat Analysis",
author = "Ahmed Taha and Alexander Lawall and Neeraj Suri",
year = "2023",
month = mar,
day = "23",
doi = "10.1109/ICNC57223.2023.10074275",
language = "English",
series = "2023 International Conference on Computing, Networking and Communications, ICNC 2023",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "506--510",
booktitle = "2023 International Conference on Computing, Networking and Communications, ICNC 2023",
note = "2023 International Conference on Computing, Networking and Communications, ICNC 2023 ; Conference date: 20-02-2023 Through 22-02-2023",
}
RIS
TY - GEN
T1 - Cloud Security Requirement Based Threat Analysis
AU - Taha, Ahmed
AU - Lawall, Alexander
AU - Suri, Neeraj
PY - 2023/3/23
Y1 - 2023/3/23
N2 - Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities systematically. Specifically, the TA, which focuses on threats that can potentially violate the customer's data ownership requirements of security and performance, is named Requirement Based Threat Analysis (RBTA). Despite the importance of RBTA, the current manual RBTA process is both time intensive and makes no assurance of completeness of the analysis. Thus, we develop a systematic analytic technique that enumerates customers' requirements and then determines all possible direct/indirect dependencies across them to conduct a generalized threat analysis from their requirements. The approach is validated for its effectiveness on actual Cloud customer requirements and can be generalized to apply to other requirements.
AB - Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities systematically. Specifically, the TA, which focuses on threats that can potentially violate the customer's data ownership requirements of security and performance, is named Requirement Based Threat Analysis (RBTA). Despite the importance of RBTA, the current manual RBTA process is both time intensive and makes no assurance of completeness of the analysis. Thus, we develop a systematic analytic technique that enumerates customers' requirements and then determines all possible direct/indirect dependencies across them to conduct a generalized threat analysis from their requirements. The approach is validated for its effectiveness on actual Cloud customer requirements and can be generalized to apply to other requirements.
KW - Cloud Security
KW - Service's dependencies
KW - Threat Analysis
U2 - 10.1109/ICNC57223.2023.10074275
DO - 10.1109/ICNC57223.2023.10074275
M3 - Conference contribution/Paper
AN - SCOPUS:85152083900
T3 - 2023 International Conference on Computing, Networking and Communications, ICNC 2023
SP - 506
EP - 510
BT - 2023 International Conference on Computing, Networking and Communications, ICNC 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 International Conference on Computing, Networking and Communications, ICNC 2023
Y2 - 20 February 2023 through 22 February 2023
ER -