Model Checking Distributed Mandatory Access Control Policies, ACM Transactions on Information and System Security, vol.18, issue.2, pp.1-625, 2015. ,
DOI : 10.1007/11556992_32
Innovative technology for cpu based attestation and sealing, 2nd Workshop on Hardware and Architectural Support for Security and Privacy, 2013. ,
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.78-87, 2013. ,
DOI : 10.1109/IC2E.2013.31
Using Dependent CORAS Diagrams to Analyse Mutual Dependency, Critical Information Infrastructures Security, pp.135-148, 2008. ,
DOI : 10.1007/978-3-540-89173-4_12
Self-service cloud computing, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.253-264, 2012. ,
DOI : 10.1145/2382196.2382226
Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing, In: Academy of Science and Engineering, 2015. ,
MyCloud, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.59-68, 2013. ,
DOI : 10.1145/2523649.2523680
MulVAL: A logic-based network security analyzer, 14th USENIX Security Symposium. SSYM'05, pp.8-8, 2005. ,
Policy-sealed data: A new abstraction for building trusted cloud services, 21st USENIX Conference on Security Symposium, pp.10-1012, 2012. ,
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems, ACM Computing Surveys, vol.48, issue.3, pp.1-4638, 2016. ,
DOI : 10.1145/2660267.2660356
Threat modeling: Designing for security, 2014. ,
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, IEEE Systems Journal, vol.7, issue.3, pp.363-373, 2013. ,
DOI : 10.1109/JSYST.2012.2221853
Trusted VM Snapshots in Untrusted Cloud Infrastructures, 15th International Conference on Research in Attacks, Intrusions, and Defenses, pp.1-21, 2012. ,
DOI : 10.1007/978-3-642-33338-5_1
Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412, 2011. ,
DOI : 10.1145/2046707.2046754
Practical protection of kernel integrity for commodity os from untrusted extensions, p.NDSS, 2011. ,