Author of the publication

Security as a Service Using an SLA-Based Approach via SPECS.

, , , , , and . CloudCom (2), page 1-6. IEEE Computer Society, (2013)978-0-7695-5095-4.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying and Utilizing Dependencies Across Cloud Security Services., , , , and . AsiaCCS, page 329-340. ACM, (2016)QRES: Quantitative Reasoning on Encrypted Security SLAs., , , , and . CoRR, (2018)Standards for Accountability in the Cloud., and . A4Cloud, volume 8937 of Lecture Notes in Computer Science, page 275-288. Springer, (2014)Using gLite to Implement a Secure ICGrid., , , , , and . CoreGRID Workshop on Grid Middleware, page 1-15. (2008)deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services., , , and . SCC, page 27-34. IEEE Computer Society, (2017)SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats., , , , and . Trustcom/BigDataSE/ISPA, page 465-472. IEEE, (2016)On the Feasibility of Side-Channel Attacks in a Virtualized Environment., , , and . ICETE (Selected Papers), volume 554 of Communications in Computer and Information Science, page 319-339. Springer, (2014)Geolocation-Based Trust for Vanet's Privacy., , and . IAS, page 287-290. IEEE Computer Society, (2008)A framework for financial botnet analysis., , , , and . eCrime, page 1-7. IEEE, (2010)Novel efficient techniques for real-time cloud security assessment., , , , , and . Computers & Security, (2016)