{"id":"https://openalex.org/W4210511657","doi":"https://doi.org/10.1109/icitst.2013.6750182","title":"Security risk analysis as a service","display_name":"Security risk analysis as a service","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W4210511657","doi":"https://doi.org/10.1109/icitst.2013.6750182"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019852243","display_name":"Mohammed A. Alhomidi","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohammed A. Alhomidi","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048860833","display_name":"Martin J. Reed","orcid":"https://orcid.org/0000-0002-6708-4478"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin J. Reed","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019852243"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63852907,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"156","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.7753926515579224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7452099323272705},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7374992966651917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7319308519363403},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6641141176223755},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5797085165977478},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5164309144020081},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5061101317405701},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.470213919878006},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.46509161591529846},{"id":"https://openalex.org/keywords/multitenancy","display_name":"Multitenancy","score":0.4562666416168213},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.414777547121048},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3863193392753601},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3281823992729187},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.1399235725402832},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1372273862361908},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07987508177757263}],"concepts":[{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.7753926515579224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7452099323272705},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7374992966651917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7319308519363403},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6641141176223755},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5797085165977478},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5164309144020081},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5061101317405701},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.470213919878006},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.46509161591529846},{"id":"https://openalex.org/C69016650","wikidata":"https://www.wikidata.org/wiki/Q1364211","display_name":"Multitenancy","level":5,"score":0.4562666416168213},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.414777547121048},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3863193392753601},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3281823992729187},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.1399235725402832},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1372273862361908},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07987508177757263},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.0},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1590752147","https://openalex.org/W2000818093","https://openalex.org/W2109026747","https://openalex.org/W2131119807","https://openalex.org/W2131629857","https://openalex.org/W2143396794","https://openalex.org/W2151936469","https://openalex.org/W2154107289","https://openalex.org/W2158327591","https://openalex.org/W2166471894","https://openalex.org/W2545130291","https://openalex.org/W6635235395"],"related_works":["https://openalex.org/W2353811196","https://openalex.org/W2165898552","https://openalex.org/W2030343105","https://openalex.org/W2418642600","https://openalex.org/W2290724697","https://openalex.org/W2979370664","https://openalex.org/W2977630600","https://openalex.org/W2354890396","https://openalex.org/W2165572034","https://openalex.org/W2894900144"],"abstract_inverted_index":{"New":[0],"features":[1],"proposed":[2],"in":[3,29,101],"emerging":[4],"cloud":[5,30,37,88,132],"computing,":[6],"such":[7],"as":[8,112,122],"multi-tenancy,":[9],"raises":[10],"many":[11],"security":[12,27,41,59,68,82,104],"challenges":[13],"against":[14,134],"the":[15,19,26,33,67,73,87,93,144],"full":[16],"adoption":[17],"of":[18,25,36,65,69,81],"new":[20],"paradigm.":[21],"A":[22],"critical":[23,74],"aspect":[24],"issues":[28],"computing":[31],"is":[32,63],"limited":[34],"knowledge":[35,100],"users":[38,96],"regarding":[39],"technical":[40,99],"mechanism":[42],"for":[43,58,84,95],"identifying":[44],"and":[45,76,106,131,142],"protecting":[46],"services":[47,133],"from":[48],"potential":[49],"risks.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54],"propose":[55],"a":[56,79,113,118,123],"framework":[57,91,126],"risk":[60,105],"analysis":[61,108],"that":[62,127],"capable":[64],"analyzing":[66],"virtual":[70],"machines(VMs),":[71],"finding":[72],"vulnerabilities":[75],"then":[77],"producing":[78],"set":[80],"recommendations":[83],"use":[85],"by":[86],"deployer.":[89],"Our":[90],"reduces":[92],"need":[94],"to":[97,109,140],"possess":[98],"handling":[102],"possible":[103,135],"allows":[107],"be":[110],"charged":[111],"service.":[114],"This":[115],"paper":[116],"develops":[117],"Security":[119],"Risk":[120],"Analysis":[121],"Service":[124],"(SRAaaS)":[125],"assesses":[128],"all":[129],"VMs":[130],"attacks":[136],"using":[137],"attack":[138],"graphs":[139],"represent":[141],"analyze":[143],"system.":[145]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
