Author of the publication

A stakeholder-oriented assessment index for cloud security auditing.

, , , and . IMCOM, page 55:1-55:7. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems., , , and . Electron. Gov. an Int. J., 6 (1): 19-40 (2009)Computing Security Scores for IoT Device Vulnerabilities., , and . ICSSA, page 52-59. IEEE, (2019)Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)., , and . ICSSA, page 34-37. IEEE, (2018)Contrology - An Ontology-Based Cloud Assurance Approach., , and . WETICE, page 105-107. IEEE Computer Society, (2015)Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns., and . ARES, page 486-492. IEEE Computer Society, (2015)A Methodology for Mining Security Tactics from Security Patterns., , and . HICSS, page 1-5. IEEE Computer Society, (2010)KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services., , and . IMCOM, page 20:1-20:6. ACM, (2015)AVDL: A highly adaptable architecture view description language., and . J. Syst. Softw., 79 (8): 1180-1206 (2006)A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies., , , and . Int. J. Mob. Commun., 7 (2): 253-267 (2009)A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions., , , , and . J. Comput. Sci. Eng., (2015)