Building safe PaaS clouds: A survey on security in multitenant software platforms

L Rodero-Merino, LM Vaquero, E Caron, A Muresan… - computers & …, 2012 - Elsevier
This paper surveys the risks brought by multitenancy in software platforms, along with the
most prominent solutions proposed to address them. A multitenant platform hosts and …

Attack surface definitions: A systematic literature review

C Theisen, N Munaiah, M Al-Zyoud, JC Carver… - Information and …, 2018 - Elsevier
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …

Map** the field of software life cycle security metrics

P Morrison, D Moye, R Pandita, L Williams - Information and Software …, 2018 - Elsevier
Context: Practitioners establish a piece of software's security objectives during the software
development process. To support control and assessment, practitioners and researchers …

A cloud design for user-controlled storage and processing of sensor data

R Hummen, M Henze, D Catrein… - 4th IEEE International …, 2012 - ieeexplore.ieee.org
Ubiquitous sensing environments such as sensor networks collect large amounts of data.
This data volume is destined to grow even further with the vision of the Internet of Things …

Benchmarking cloud security level agreements using quantitative policy trees

J Luna Garcia, R Langenberg, N Suri - … of the 2012 ACM Workshop on …, 2012 - dl.acm.org
While the many economic and technological advantages of Cloud computing are apparent,
the migration of key sector applications onto it has been limited, in part, due to the lack of …

I-JVM: a Java virtual machine for component isolation in OSGi

N Geoffray, G Thomas, G Muller… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
The OSGi framework is a Java-based, centralized, component oriented platform. It is being
widely adopted as an execution environment for the development of extensible applications …

Maintaining user control while storing and processing sensor data in the cloud

M Henze, R Hummen, R Matzutt, D Catrein… - International Journal of …, 2013 - igi-global.com
Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing
large amounts of data. Eventually, sensor networks will automatically collect such data. A …

ModGuard : Identifying Integrity & Confidentiality Violations in Java Modules

A Dann, B Hermann, E Bodden - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With version 9, Java has been given the new module system Jigsaw. Major goals were to
simplify maintainability of the JDK and improve its security by encapsulating modules' …

Liability in software engineering: overview of the LISE approach and illustration on a case study

D Le Métayer, M Maarek, VVT Tong, E Mazza… - Proceedings of the …, 2010 - dl.acm.org
LISE is a multidisciplinary project involving lawyers and computer scientists with the aim to
put forward a set of methods and tools to (1) define software liability in a precise and …

[PDF][PDF] Security indicators–a state of the art survey public report

M Rudolph, R Schwarz - FhG IESE VII (043), 2012 - publica.fraunhofer.de
Measurement is one of the foundations of sound engineering practices, because—as Tom
DeMarco put it—you cannot control what you can't measure. This principle should also apply …