{"id":"https://openalex.org/W2155630885","doi":"https://doi.org/10.1109/icebe.2010.77","title":"Analysis on Cloud-Based Security Vulnerability Assessment","display_name":"Analysis on Cloud-Based Security Vulnerability Assessment","publication_year":2010,"publication_date":"2010-11-01","ids":{"openalex":"https://openalex.org/W2155630885","doi":"https://doi.org/10.1109/icebe.2010.77","mag":"2155630885"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icebe.2010.77","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087996333","display_name":"Huan-Chung Li","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"funder","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Huan-Chung Li","raw_affiliation_strings":["Graduate Institute of Networking and Multimedia, National Taiwan University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Graduate Institute of Networking and Multimedia, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032547319","display_name":"Po-Huei Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I87354575","display_name":"National Chengchi University","ror":"https://ror.org/03rqk8h36","country_code":"TW","type":"funder","lineage":["https://openalex.org/I87354575"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Po-Huei Liang","raw_affiliation_strings":["Department of Management Information System, National Chengchi University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information System, National Chengchi University, Taipei, Taiwan","institution_ids":["https://openalex.org/I87354575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064687730","display_name":"Jiann-Min Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I87354575","display_name":"National Chengchi University","ror":"https://ror.org/03rqk8h36","country_code":"TW","type":"funder","lineage":["https://openalex.org/I87354575"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jiann-Min Yang","raw_affiliation_strings":["Department of Management Information System, National Chengchi University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information System, National Chengchi University, Taipei, Taiwan","institution_ids":["https://openalex.org/I87354575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063964018","display_name":"Shiang-Jiun Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I3141939062","display_name":"Institute for Information Industry","ror":"https://ror.org/01d8kr740","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I3141939062"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shiang-Jiun Chen","raw_affiliation_strings":["Innovative DigiTech-Enabled Applications & Services Institute, Institute for Information Industry, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Innovative DigiTech-Enabled Applications & Services Institute, Institute for Information Industry, Taipei, Taiwan","institution_ids":["https://openalex.org/I3141939062"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.509,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":51,"citation_normalized_percentile":{"value":0.926376,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"490","last_page":"494"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.62778187},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.5467029},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.53398275},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5039608}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.81821835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78220534},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6779727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6746365},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.62778187},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5467029},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5393031},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.53398275},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5227511},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5039608},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.48844448},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.48092243},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25298738},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10518286},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icebe.2010.77","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.65}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1262401806","https://openalex.org/W1488058190","https://openalex.org/W1557968181","https://openalex.org/W1564241452","https://openalex.org/W169067895","https://openalex.org/W2107155031","https://openalex.org/W2118043377","https://openalex.org/W2131629857","https://openalex.org/W2381109732","https://openalex.org/W2396553820","https://openalex.org/W2485118388","https://openalex.org/W2785692188","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4388541873","https://openalex.org/W4298219515","https://openalex.org/W4220885008","https://openalex.org/W3118510577","https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W2185499427","https://openalex.org/W2057803998","https://openalex.org/W2021298062","https://openalex.org/W1613146948"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,45],"delivery":[2],"model":[3,66],"can":[4,14,83,162,181],"significantly":[5],"reduce":[6],"enterprise":[7,41],"IT":[8,42],"costs":[9],"and":[10,20,26,50,149],"complexities.":[11],"This":[12,178],"technology":[13,34],"handle":[15],"the":[16,47,53,69,73,85,99,116,130,136,150,154,160,169,175,186],"rapidly":[17],"gowning":[18],"environment":[19],"provide":[21],"more":[22,123,143],"flexible":[23],"resources":[24],"sharing":[25],"hence":[27],"it":[28,103],"has":[29],"become":[30],"as":[31],"anew":[32],"information":[33,171],"infrastructure":[35],"recently.":[36],"In":[37,98,125,157],"contrast":[38],"to":[39,52,71,107,114,167,184],"traditional":[40],"solution,":[43],"cloud":[44,101,137],"moves":[46],"application":[48],"software":[49],"databases":[51],"servers":[54,151],"in":[55,153,188],"large":[56],"data":[57],"centers":[58],"which":[59],"raise":[60],"many":[61],"security":[62,132],"challenges.":[63],"The":[64,81],"business":[65],"now":[67],"allows":[68],"users":[70],"purchase":[72],"capacity":[74],"they":[75,78],"require":[76,79],"when":[77],"it.":[80],"providers":[82],"maximize":[84],"utilization":[86],"by":[87],"multiplexing":[88],"customer":[89],"virtual":[90,120],"machines":[91],"(VMs)":[92],"across":[93],"a":[94],"shared":[95,100],"physical":[96],"infrastructure.":[97],"environment,":[102],"would":[104],"be":[105,182],"possible":[106],"launch":[108],"an":[109,164],"attack":[110],"cross":[111],"VMs.":[112],"How":[113],"define":[115],"policies":[117],"for":[118],"individual":[119],"firewall":[121],"becomes":[122],"important.":[124],"this":[126],"paper,":[127],"we":[128],"investigate":[129],"different":[131],"vulnerability":[133,144,147],"assessments":[134],"among":[135],"environments.":[138],"Experiment":[139],"shows":[140],"there":[141],"are":[142,152],"happened":[145],"if":[146,172],"tools":[148],"same":[155,176],"LAN.":[156,177],"other":[158],"word,":[159],"hackers":[161],"find":[163],"easier":[165],"way":[166],"get":[168],"target":[170],"sit":[173],"on":[174],"experimental":[179],"result":[180],"used":[183],"analysis":[185],"risk":[187],"third":[189],"party":[190],"compute":[191],"clouds.":[192]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2155630885","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":7}],"updated_date":"2025-03-16T07:23:13.831535","created_date":"2016-06-24"}