Author of the publication

Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors.

, , and . ICECCS, page 70-79. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMURF: Supporting Multi-tenancy Using Re-aspects Framework., , and . ICECCS, page 361-370. IEEE Computer Society, (2012)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)Supporting automated software re-engineering using re-aspects., , and . ASE, page 230-233. ACM, (2012)Identifying OS Kernel Objects for Run-Time Security Analysis., , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 72-85. Springer, (2012)Adaptable, model-driven security engineering for SaaS cloud-based applications., , and . Autom. Softw. Eng., 21 (2): 187-224 (2014)Emerging Security Challenges of Cloud Virtual Infrastructure., , and . CoRR, (2016)CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model., , , and . NSS, page 113-120. IEEE, (2011)Collaboration-Based Cloud Computing Security Management Framework., , and . IEEE CLOUD, page 364-371. IEEE Computer Society, (2011)TOSSMA: A Tenant-Oriented SaaS Security Management Architecture., , and . IEEE CLOUD, page 981-988. IEEE Computer Society, (2012)Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap., , , and . IEEE CLOUD, page 836-843. IEEE Computer Society, (2012)