Search For:

Displaying 1-8 out of 8 total
What's Special about Cloud Security?
Found in: IT Professional
By Peter Mell
Issue Date:July 2012
pp. 6-8
Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues ...
 
What's Special about Cloud Security?
Found in: IT Professional
By Peter Mell
Issue Date:July 2012
pp. 6-8
Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues ...
 
What's Special about Cloud Security?
Found in: IT Professional
By Peter Mell
Issue Date:July 2012
pp. 6-8
Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues ...
 
An analysis of CVSS version 2 vulnerability scoring
Found in: Empirical Software Engineering and Measurement, International Symposium on
By Karen Scarfone, Peter Mell
Issue Date:October 2009
pp. 516-525
The Common Vulnerability Scoring System (CVSS) is a specification for measuring the relative severity of software vulnerabilities. Finalized in 2007, CVSS version 2 was designed to address deficiencies found during analysis and use of the original CVSS ver...
 
Common Vulnerability Scoring System
Found in: IEEE Security and Privacy
By Peter Mell, Karen Scarfone, Sasha Romanosky
Issue Date:November 2006
pp. 85-89
Vendors have historically used proprietary methods for scoring software vulnerabilities, usually without detailing their criteria or processes. The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenti...
 
Big data technology and implications for security research
Found in: Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security (BADGERS '12)
By Peter Mell
Issue Date:October 2012
pp. 15-16
Recent analysis of traffic reaching the UCSD Network Telescope (a /8 darknet) revealed a sophisticated botnet scanning event that covertly scanned the entire IPv4 space in about 12 days. We only serendipitously discovered this event while studying a comple...
     
State of security readiness
Found in: Crossroads
By Peter Mell, Ramaswamy Chandramouli, Ramaswamy Chandramouli
Issue Date:March 2010
pp. 23-25
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. With this pay-as-...
     
Vulnerability scoring for security configuration settings
Found in: Proceedings of the 4th ACM workshop on Quality of protection (QoP '08)
By Karen Scarfone, Peter Mell
Issue Date:October 2008
pp. 1-2
The best-known vulnerability scoring standard, the Common Vulnerability Scoring System (CVSS), is designed to quantify the severity of security-related software flaw vulnerabilities. This paper describes our efforts to determine if CVSS could be adapted fo...
     
 1