Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
Writing Effective Use Cases
Survivable Network System Analysis: A Case Study
IEEE Software
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Use Case Pitfalls: Top 10 Problems from Real Projects Using Use Cases
TOOLS '99 Proceedings of the Technology of Object-Oriented Languages and Systems
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Misuse and Abuse Cases: Getting Past the Positive
IEEE Security and Privacy
Architecting the Lumeta firewall analyzer
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
Defining future platform requirements for e-Science clouds
Proceedings of the 1st ACM symposium on Cloud computing
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Managing the configuration complexity of distributed applications in Internet data centers
IEEE Communications Magazine
Streaming video over the Internet: approaches and directions
IEEE Transactions on Circuits and Systems for Video Technology
Improving cloud network security using the Tree-Rule firewall
Future Generation Computer Systems
Hi-index | 0.00 |
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.