{"title":"云计算的威胁和对策模式","authors":"T. Okubo, Yoshiro Wataguchi, Nobuyuki Kanaya","doi":"10.1109/RePa.2014.6894843","DOIUrl":null,"url":null,"abstract":"Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.","PeriodicalId":164550,"journal":{"name":"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Threat and countermeasure patterns for cloud computing\",\"authors\":\"T. Okubo, Yoshiro Wataguchi, Nobuyuki Kanaya\",\"doi\":\"10.1109/RePa.2014.6894843\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.\",\"PeriodicalId\":164550,\"journal\":{\"name\":\"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)\",\"volume\":\"217 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RePa.2014.6894843\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RePa.2014.6894843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Threat and countermeasure patterns for cloud computing
Recently cloud computing markets have expanded, and there are various kind of services and their providers. How-ever, Security is the primary concern of cloud users. However, service providers are unaware precisely of the types of security countermeasures required for their cloud servers. A method to define what the type security required for each operator using two security patterns are proposed. One is for typical threats and the other is for typical countermeasures. Using the two patterns with the relationship information among the functions, cloud components and stakeholders, the security coverage of the cloud and the security duties of each operator become clear.