DocumentCode
3728474
Title
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems
Author
Mustafa Aydin;Jeremy Jacob
Author_Institution
Dept. of Comput. Sci., Univ. of York, York, UK
fYear
2015
Firstpage
53
Lastpage
60
Abstract
We present Cloud-COVER (Controls and Orderings for Vulnerabilities and ExposuRes), a cloud security threat modelling tool. Cloud-COVER takes input from a user about their deployment, requiring information about the data, instances, connections, their properties, and the importance of various security attributes. This input is used to analyse the relevant threats, and the way they propagate through the system. They are then presented to the user, ordered according to the security attributes they have prioritised, along with the best countermeasures to secure against the dangers listed.
Keywords
"Security","Cloud computing","Analytical models","Computational modeling","Risk management","Data models"
Publisher
ieee
Conference_Titel
Intelligence and Security Informatics Conference (EISIC), 2015 European
Type
conf
DOI
10.1109/EISIC.2015.11
Filename
7379723
Link To Document