Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying and Utilizing Dependencies Across Cloud Security Services., , , , and . AsiaCCS, page 329-340. ACM, (2016)Standards for Accountability in the Cloud., and . A4Cloud, volume 8937 of Lecture Notes in Computer Science, page 275-288. Springer, (2014)Using gLite to Implement a Secure ICGrid., , , , , and . CoreGRID Workshop on Grid Middleware, page 1-15. (2008)QRES: Quantitative Reasoning on Encrypted Security SLAs., , , , and . CoRR, (2018)SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats., , , , and . Trustcom/BigDataSE/ISPA, page 465-472. IEEE, (2016)deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services., , , and . SCC, page 27-34. IEEE Computer Society, (2017)Benchmarking IP blacklists for financial botnet detection., , , , and . IAS, page 62-67. IEEE, (2010)Static evaluation of Certificate Policies for GRID PKIs interoperability., , , , and . ARES, page 391-399. IEEE Computer Society, (2007)AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security., , , and . TrustCom, page 284-291. IEEE Computer Society, (2014)Leveraging the Potential of Cloud Security Service-Level Agreements through Standards., , , and . IEEE Cloud Computing, 2 (3): 32-40 (2015)