{"title":"Classifying Software Vulnerabilities by Using the Bugs Framework","authors":"T. M. Adhikari, Y. Wu","doi":"10.1109/ISDFS49300.2020.9116209","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116209","url":null,"abstract":"Software vulnerabilities, specific type of software bugs, are defined as occurrences of a software weakness, which can be exploited by an agent to cause various consequences such as modifying or accessing unintended data. Identifying and fixing software vulnerabilities thus plays an important role in software security and software engineering. A reliable body of knowledge on categories of vulnerabilities is critical to identify software vulnerabilities. In this paper, we use data-mining techniques to identify software vulnerabilities, classify them into different categories by using the Bugs Framework proposed by the National Institute of Standards and Technology (NIST), and design a model to predict the weakness of future vulnerabilities. Knowledge about vulnerability types helps software engineers save time and energy, develop programs by avoiding security vulnerabilities, and program with precaution.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud and Fog Computing: A Survey to the Concept and Challenges","authors":"Muhammad Raheel Raza, A. Varol, Nurhayat Varol","doi":"10.1109/ISDFS49300.2020.9116360","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116360","url":null,"abstract":"Cloud Computing is one of the most emerging technologies that has transformed the macro world. The advent of cloud computing is not less than an evolution and miracle to the technology. It has made the on-demand availability of various scalable software resources possible over the internet. Although its extraordinary services and advantages like reduction of computing and storage resources as well as reducing cost, there are some barriers that limits and challenges the usability of cloud computing. On the other hand, Fog Computing, another computing paradigm, is an extended and advanced version of cloud computing. Having distributed nature, Fog Computing tries to address the limitations faced by cloud computing. The paper provides a general study of the challenges faced by cloud computing and how fog computing infrastructure serves to be an emerging technology to those limitations.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISDFS 2020 Author Information Page","authors":"","doi":"10.1109/isdfs49300.2020.9116427","DOIUrl":"https://doi.org/10.1109/isdfs49300.2020.9116427","url":null,"abstract":"","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Parameters for Viable SLA in Cloud","authors":"Muhammad Raheel Raza, A. Varol","doi":"10.1109/ISDFS49300.2020.9116311","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116311","url":null,"abstract":"Quality of Service (QoS) is a key factor for a viable Service Level Agreement (SLA) which ensures the formation of a reliable provider-consumer relationship in cloud computing. SLA ties up a service provider with a service consumer on agreed upon terms and conditions so that the provider’s promised services and the consumer’s requirements are fulfilled which results in a trustful relationship between them. In this paper, an analysis of the existing literature is made to identify the gaps needed to be filled for establishing a trustful relationship. The literature is classified w.r.t the QoS potential attributes i.e. trust, resource management, risk management, security, task scheduling and performance etc. contributing to maintain a feasible SLA.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}