| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | 조정석 | - |
| dc.contributor.author | 곽진 | - |
| dc.date.issued | 2019-06 | - |
| dc.identifier.issn | 1598-3986 | - |
| dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/37369 | - |
| dc.identifier.uri | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002481313 | - |
| dc.description.abstract | Cloud networks are used to provide various services. As services are increasingly deployed using cloud networks, thereare a number of resources in the cloud that leverage a variety of environments and protocols. However, there is a securityintrusion on these resources, and research on cloud network vulnerability detection is required as threats to cloud resourcesemerge. In this paper, we propose a vulnerability detection scheme using STRIDE and HARM for vulnerability detection ofresources utilizing various environments and protocols, and present cloud network vulnerability detection scheme throughvulnerability detection scenario composition | - |
| dc.language.iso | Eng | - |
| dc.publisher | 한국정보보호학회 | - |
| dc.title | STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme | - |
| dc.title.alternative | STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme | - |
| dc.type | Article | - |
| dc.citation.endPage | 612 | - |
| dc.citation.number | 3 | - |
| dc.citation.startPage | 599 | - |
| dc.citation.title | 정보보호학회논문지 | - |
| dc.citation.volume | 29 | - |
| dc.identifier.bibliographicCitation | 정보보호학회논문지, Vol.29 No.3, pp.599-612 | - |
| dc.identifier.doi | 10.13089/JKIISC.2019.29.3.599 | - |
| dc.subject.keyword | Cloud | - |
| dc.subject.keyword | Vulnerability Detection | - |
| dc.subject.keyword | STRIDE | - |
| dc.subject.keyword | HARM | - |
| dc.type.other | Article | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.