Planned intervention: On Wednesday April 3rd 05:30 UTC Zenodo will be unavailable for up to 2-10 minutes to perform a storage cluster upgrade.
Published July 31, 2018 | Version v1
Report Open

Modeling Data Protection Vulnerabilities of Cloud Systems using Risk Patterns

  • 1. paluno - The Ruhr Institute for Software Technology; University of Duisburg-Essen, Essen, Germany

Description

This technical reports contains the full catalog of the devised risk patterns concerning the publication 'Modeling Data Protection Vulnerabilities of Cloud Systems using Risk Patterns' submitted and accepted at the 'System Analysis and Modeling 2018' conference held in Kopenhagen, Denmark in 2018.

Files

A._Palm,_Z._A._Mann,_A._Metzger_-_Modeling_Data_Protection_Vulnerabilities_of_Cloud_Systems_using_Risk_Patterns_(Technical_Report).pdf

Additional details

Funding

RESTASSURED – Secure Data Processing in the Cloud 731678
European Commission