Browsing by Author "Nhlabatsi A."
Now showing items 1-6 of 6
-
CloudSafe: A tool for an automated security analysis for cloud computing
An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; Fetais N.; Khan K.M.; Kim D.S.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
Requirements and specifications for adaptive security: Concepts and analysis
Tun T.T.; Yang M.; Bandara A.K.; Yu Y.; Nhlabatsi A.; Khan N.; Khan K.M.; Nuseibeh B.... more authors ... less authors ( IEEE Computer Society , 2018 , Conference Paper)In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment are ... -
SpiralSRA: A threat-specific security risk assessment framework for the cloud
Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ... -
Systematic identification of threats in the cloud: A Survey
Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; Kim D.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...