Presentation | 2012-03-16 Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro KITO, Satoshi KAI, Tomohiro SHIGEMOTO, Satoshi TAKEMOTO, Tadashi KAJI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing environment which users can use at ease, we think that it is necessary for cloud providers to figure out whether security measures are appropriately performed in the cloud computing environment. In this paper, we report about the study of the method which quantifies whether security measures are appropriately performed. In this method, we collect information from cloud computing environment, such as configuration of security devices and software vulnerabilities, and quantifies using these information from the viewpoint of reachability of attacks to the information assets to be protected. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cloud computing / Security measures / Vulnerability / Quantification / Attack Graph |
Paper # | ICSS2011-44 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2012/3/9(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks |
Sub Title (in English) | |
Keyword(1) | Cloud computing |
Keyword(2) | Security measures |
Keyword(3) | Vulnerability |
Keyword(4) | Quantification |
Keyword(5) | Attack Graph |
1st Author's Name | Tetsuro KITO |
1st Author's Affiliation | Yokohama Research Laboratory, Hitachi, Ltd.() |
2nd Author's Name | Satoshi KAI |
2nd Author's Affiliation | Yokohama Research Laboratory, Hitachi, Ltd. |
3rd Author's Name | Tomohiro SHIGEMOTO |
3rd Author's Affiliation | Yokohama Research Laboratory, Hitachi, Ltd. |
4th Author's Name | Satoshi TAKEMOTO |
4th Author's Affiliation | Information & Telecommunication Systems Company, Hitachi, Ltd. |
5th Author's Name | Tadashi KAJI |
5th Author's Affiliation | Yokohama Research Laboratory, Hitachi, Ltd. |
Date | 2012-03-16 |
Paper # | ICSS2011-44 |
Volume (vol) | vol.111 |
Number (no) | 495 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |