IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2012-03-16 13:45
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks
Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44
Abstract (in Japanese) (See Japanese page) 
(in English) There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing environment which users can use at ease, we think that it is necessary for cloud providers to figure out whether security measures are appropriately performed in the cloud computing environment. In this paper, we report about the study of the method which quantifies whether security measures are appropriately performed. In this method, we collect information from cloud computing environment, such as configuration of security devices and software vulnerabilities, and quantifies using these information from the viewpoint of reachability of attacks to the information assets to be protected.
Keyword (in Japanese) (See Japanese page) 
(in English) Cloud computing / Security measures / Vulnerability / Quantification / Attack Graph / / /  
Reference Info. IEICE Tech. Rep., vol. 111, no. 495, ICSS2011-44, pp. 31-36, March 2012.
Paper # ICSS2011-44 
Date of Issue 2012-03-09 (ICSS) 
ISSN Print edition: ISSN 0913-5685    Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF ICSS2011-44

Conference Information
Committee ICSS  
Conference Date 2012-03-16 - 2012-03-16 
Place (in Japanese) (See Japanese page) 
Place (in English) Kikai-Shinko-Kaikan Bldg. 
Topics (in Japanese) (See Japanese page) 
Topics (in English) General 
Paper Information
Registration To ICSS 
Conference Code 2012-03-ICSS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks 
Sub Title (in English)  
Keyword(1) Cloud computing  
Keyword(2) Security measures  
Keyword(3) Vulnerability  
Keyword(4) Quantification  
Keyword(5) Attack Graph  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Tetsuro Kito  
1st Author's Affiliation Hitachi, Ltd. (Hitachi)
2nd Author's Name Satoshi Kai  
2nd Author's Affiliation Hitachi, Ltd. (Hitachi)
3rd Author's Name Tomohiro Shigemoto  
3rd Author's Affiliation Hitachi, Ltd. (Hitachi)
4th Author's Name Satoshi Takemoto  
4th Author's Affiliation Hitachi, Ltd. (Hitachi)
5th Author's Name Tadashi Kaji  
5th Author's Affiliation Hitachi, Ltd. (Hitachi)
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
21st Author's Name  
21st Author's Affiliation ()
22nd Author's Name  
22nd Author's Affiliation ()
23rd Author's Name  
23rd Author's Affiliation ()
24th Author's Name  
24th Author's Affiliation ()
25th Author's Name  
25th Author's Affiliation ()
26th Author's Name / /
26th Author's Affiliation ()
()
27th Author's Name / /
27th Author's Affiliation ()
()
28th Author's Name / /
28th Author's Affiliation ()
()
29th Author's Name / /
29th Author's Affiliation ()
()
30th Author's Name / /
30th Author's Affiliation ()
()
31st Author's Name / /
31st Author's Affiliation ()
()
32nd Author's Name / /
32nd Author's Affiliation ()
()
33rd Author's Name / /
33rd Author's Affiliation ()
()
34th Author's Name / /
34th Author's Affiliation ()
()
35th Author's Name / /
35th Author's Affiliation ()
()
36th Author's Name / /
36th Author's Affiliation ()
()
Speaker Author-1 
Date Time 2012-03-16 13:45:00 
Presentation Time 25 minutes 
Registration for ICSS 
Paper # ICSS2011-44 
Volume (vol) vol.111 
Number (no) no.495 
Page pp.31-36 
#Pages
Date of Issue 2012-03-09 (ICSS) 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan