Whetstone: Reliable Monitoring of Cloud Services. | 0 | 0.34 | 2018 |
QRES: Quantitative Reasoning on Encrypted Security SLAs. | 0 | 0.34 | 2018 |
DevOps for Better Software Security in the Cloud Invited Paper | 0 | 0.34 | 2017 |
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces | 0 | 0.34 | 2017 |
Quantitative Reasoning about Cloud Security Using Service Level Agreements. | 15 | 0.72 | 2017 |
A Framework for Ranking Cloud Security Services | 0 | 0.34 | 2017 |
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. | 0 | 0.34 | 2017 |
Eliciting metrics for accountability of cloud systems. | 2 | 0.36 | 2016 |
Quantifiably Trusting the Cloud: Putting Metrics to Work. | 3 | 0.40 | 2016 |
Identifying and Utilizing Dependencies Across Cloud Security Services. | 3 | 0.42 | 2016 |
Novel efficient techniques for real-time cloud security assessment. | 8 | 0.49 | 2016 |
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. | 9 | 0.91 | 2015 |
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. | 2 | 0.41 | 2015 |
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security | 16 | 1.16 | 2014 |
On the Feasibility of Side-Channel Attacks in a Virtualized Environment. | 0 | 0.34 | 2014 |
Quantitative Assessment Of Software Vulnerabilities Based On Economic-Driven Security Metrics | 2 | 0.41 | 2013 |
SecLA-Based Negotiation and Brokering of Cloud Resources. | 0 | 0.34 | 2013 |
Predictive Vulnerability Scoring In The Context Of Insufficient Information Availability | 6 | 0.46 | 2013 |
Security as a Service Using an SLA-Based Approach via SPECS | 29 | 1.45 | 2013 |
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs | 2 | 0.39 | 2012 |
CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments | 0 | 0.34 | 2010 |
An interoperability system for authentication and authorisation in VANETs | 3 | 0.45 | 2010 |
Data-centric privacy protocol for intensive care grids | 3 | 0.50 | 2010 |
Data privacy considerations in Intensive Care Grids. | 0 | 0.34 | 2008 |
Geolocation-Based Trust for Vanet's Privacy | 9 | 0.89 | 2008 |
Using Desktop Grids To Securely Store E-Health Data | 0 | 0.34 | 2008 |
Using gLite to Implement a Secure ICGrid. | 0 | 0.34 | 2008 |
Using OGRO and CertiVeR to improve OCSP validation for Grids | 8 | 0.75 | 2007 |
Interoperable grid PKIs among untrusted domains: an architectural proposal | 6 | 0.64 | 2007 |
Static evaluation of Certificate Policies for GRID PKIs interoperability | 5 | 0.52 | 2007 |
OCSP for Grids: Comparing Prevalidation versus Caching | 4 | 0.53 | 2006 |
Towards a unified authentication and authorization infrastructure for grid services: implementing an enhanced OCSP service provider into GT4 | 8 | 0.80 | 2005 |