Author:
Casola Valentina,De Benedictis Alessandra,Rak Massimiliano,Salzillo Giovanni
Publisher
Springer International Publishing
Reference18 articles.
1. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn (2008). http://www.cl.cam.ac.uk/~rja14/book.html
2. Casola, V., De Benedictis, A., Erascu, M., Modic, J., Rak, M.: Automatically enforcing security SLAs in the cloud. IEEE Trans. Serv. Comput. 10(5), 741–755 (2017)
3. Casola, V., De Benedictis, A., Rak, M., Villano, U.: A methodology for automated penetration testing of cloud applications. Int. J. Grid Util. Comput. 11(2), 267–277 (2020)
4. Casola, V., De Benedictis, A., Rak, M., Villano, U.: A novel security-by-design methodology: modeling and assessing security by SLAs with a quantitative approach. J. Syst. Softw. 163, 110537 (2020)
5. Cavoukian, A., Chanliau, M.: Privacy and security by design: an enterprise architecture approach (2013). https://www.ipc.on.ca/wp-content/uploads/Resources/pbd-privacy-and-security-by-design-oracle.pdf
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study;2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom);2023-12-04
2. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach;IEEE Access;2023
3. MetaSEnD: A Security Enabled Development Life Cycle Meta-Model;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. Risk Analysis Automation Process in IT Security for Cloud Applications;Communications in Computer and Information Science;2022
5. Threat Modeling of Edge-Based IoT Applications;Communications in Computer and Information Science;2021