Login / Signup
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Doudou Fall
Takeshi Okuda
Youki Kadobayashi
Suguru Yamaguchi
Published in:
TRUST (2014)
Keyphrases
</>
risk assessment
information security
management system
buffer overflow
enterprise systems
access control
security vulnerabilities
security requirements
statistical databases
penetration testing
distributed multimedia
security problems
real time
formal model
intrusion detection
security policies
human operators
security level
communication protocols
software architecture
security architecture
tree structure
distributed systems
neural network