Author of the publication

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle.

, , , , and . ARES, page 428-436. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Analysis of Underground Marketplaces., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 31-42. Springer, (2014)Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure., and . Computers & Security, 31 (4): 629 (2012)Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud., , , , and . CloudCom, page 956-963. IEEE Computer Society, (2014)Towards a Unified Penetration Testing Taxonomy., , , , , , and . SocialCom/PASSAT, page 811-812. IEEE Computer Society, (2012)Data Confidentiality using Fragmentation in Cloud Computing., , , , and . Int. J. Pervasive Computing and Communications, (2013)A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology., , , , , , and . CloudCom, page 386-393. IEEE Computer Society, (2014)Towards Continuous Cloud Service Assurance for Critical Infrastructure IT., , , , and . FiCloud, page 175-182. IEEE Computer Society, (2014)Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud., , , , and . FiCloud, page 1-8. IEEE Computer Society, (2015)Harmonized Monitoring for High Assurance Clouds., , , , , and . IC2E Workshops, page 118-123. IEEE Computer Society, (2016)Model Based Process to Support Security and Privacy Requirements Engineering., , , , and . IJSSE, 3 (3): 1-22 (2012)