7
Institute of Architecture of Application Systems, University of Stuttgart, Germany {saatkamp, krieger, leymann, sudendorf, wurster}@iaas.uni-stuttgart.de Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCA Karoline Saatkamp, Christoph Krieger, Frank Leymann, Julian Sudendorf, Michael Wurster © 2019 IEEE Computer Society. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. @inproceedings{Saatkamp2019_ThreatMitigationTOSCA, author = {Karoline Saatkamp and Christoph Krieger and Frank Leymann and Julian Sudendorf and Michael Wurster}, title = {Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCA}, booktitle = {2019 International Conference on Networked Systems (NetSys)}, year = {2019}, doi = {10.1109/NetSys.2019.8854524}, publisher = {IEEE} } : Institute of Architecture of Application Systems

Application Threat Modeling and Automated VNF Selection

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Application Threat Modeling and Automated VNF Selection

Institute of Architecture of Application Systems, University of Stuttgart, Germany

{saatkamp, krieger, leymann, sudendorf, wurster}@iaas.uni-stuttgart.de

Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCA

Karoline Saatkamp, Christoph Krieger, Frank Leymann, Julian Sudendorf, Michael Wurster

© 2019 IEEE Computer Society. Personal use of this material ispermitted. However, permission to reprint/republish this material foradvertising or promotional purposes or for creating new collective worksfor resale or redistribution to servers or lists, or to reuse any copyrightedcomponent of this work in other works must be obtained from the IEEE.

@inproceedings{Saatkamp2019_ThreatMitigationTOSCA,author = {Karoline Saatkamp and Christoph Krieger and Frank Leymann and

Julian Sudendorf and Michael Wurster},title = {Application Threat Modeling and Automated VNF Selection for

Mitigation using TOSCA},booktitle = {2019 International Conference on Networked Systems (NetSys)},year = {2019},doi = {10.1109/NetSys.2019.8854524},publisher = {IEEE}

}

:

Institute of Architecture of Application Systems

Page 2: Application Threat Modeling and Automated VNF Selection
Page 3: Application Threat Modeling and Automated VNF Selection
Page 4: Application Threat Modeling and Automated VNF Selection
Page 5: Application Threat Modeling and Automated VNF Selection
Page 6: Application Threat Modeling and Automated VNF Selection
Page 7: Application Threat Modeling and Automated VNF Selection