Author of the publication

Quantitative Reasoning about Cloud Security Using Service Level Agreements.

, , , and . IEEE Trans. Cloud Comput., 5 (3): 457-471 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Management Architecture for NFV/SDN-Aware IoT Systems., , , , , , , , and . IEEE Internet of Things Journal, 6 (5): 8005-8020 (2019)Threat Modeling the Cloud: An Ontology Based Approach., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 61-72. Springer, (2018)Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 27-38. Springer, (2018)deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services., , , and . SCC, page 27-34. IEEE Computer Society, (2017)Blended Identity: Pervasive IdM for Continuous Authentication., , , , and . IEEE Secur. Priv., 13 (3): 32-39 (2015)Self-service Privacy: User-Centric Privacy for Network-Centric Identity., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 17-31. Springer, (2010)A user-centric approach to service creation and delivery over next generation networks., , , and . Comput. Commun., 34 (2): 209-222 (2011)Novel efficient techniques for real-time cloud security assessment., , , , , and . Comput. Secur., (2016)Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services., , , and . ARES, page 5:1-5:10. ACM, (2018)Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services., , and . FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 447-461. Springer, (2007)