Presentation 2012-03-16
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks
Tetsuro KITO, Satoshi KAI, Tomohiro SHIGEMOTO, Satoshi TAKEMOTO, Tadashi KAJI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing environment which users can use at ease, we think that it is necessary for cloud providers to figure out whether security measures are appropriately performed in the cloud computing environment. In this paper, we report about the study of the method which quantifies whether security measures are appropriately performed. In this method, we collect information from cloud computing environment, such as configuration of security devices and software vulnerabilities, and quantifies using these information from the viewpoint of reachability of attacks to the information assets to be protected.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cloud computing / Security measures / Vulnerability / Quantification / Attack Graph
Paper # ICSS2011-44
Date of Issue

Conference Information
Committee ICSS
Conference Date 2012/3/9(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks
Sub Title (in English)
Keyword(1) Cloud computing
Keyword(2) Security measures
Keyword(3) Vulnerability
Keyword(4) Quantification
Keyword(5) Attack Graph
1st Author's Name Tetsuro KITO
1st Author's Affiliation Yokohama Research Laboratory, Hitachi, Ltd.()
2nd Author's Name Satoshi KAI
2nd Author's Affiliation Yokohama Research Laboratory, Hitachi, Ltd.
3rd Author's Name Tomohiro SHIGEMOTO
3rd Author's Affiliation Yokohama Research Laboratory, Hitachi, Ltd.
4th Author's Name Satoshi TAKEMOTO
4th Author's Affiliation Information & Telecommunication Systems Company, Hitachi, Ltd.
5th Author's Name Tadashi KAJI
5th Author's Affiliation Yokohama Research Laboratory, Hitachi, Ltd.
Date 2012-03-16
Paper # ICSS2011-44
Volume (vol) vol.111
Number (no) 495
Page pp.pp.-
#Pages 6
Date of Issue