Loading [MathJax]/extensions/MathMenu.js
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems | IEEE Conference Publication | IEEE Xplore

Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems


Abstract:

We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their...Show More

Abstract:

We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed.
Date of Conference: 07-09 September 2015
Date Added to IEEE Xplore: 14 January 2016
ISBN Information:
Conference Location: Manchester, UK

Contact IEEE to Subscribe

References

References is not available for this document.