Quantitative reasoning about cloud security using service level agreements

J Luna, A Taha, R Trapero… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
While the economic and technological advantages of cloud computing are apparent, its
overall uptake has been limited, in part, due to the lack of security assurance and …

A moving target defense approach for protecting resource-constrained distributed devices

V Casola, A De Benedictis… - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
Techniques aimed at continuously changing a system's attack surface, usually referred to as
Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks …

Benchmarking cloud security level agreements using quantitative policy trees

J Luna Garcia, R Langenberg, N Suri - … of the 2012 ACM Workshop on …, 2012 - dl.acm.org
While the many economic and technological advantages of Cloud computing are apparent,
the migration of key sector applications onto it has been limited, in part, due to the lack of …

AHP-based quantitative approach for assessing and comparing cloud security

A Taha, R Trapero, J Luna… - 2014 IEEE 13th …, 2014 - ieeexplore.ieee.org
While Cloud usage increasingly involves security considerations, there is still a conspicuous
lack of techniques for users to assess/ensure that the security level advertised by the Cloud …

A moving target defense mechanism for manets based on identity virtualization

M Albanese, A De Benedictis… - 2013 IEEE Conference …, 2013 - ieeexplore.ieee.org
Mechanisms for continuously changing or shifting a system's attack surface are emerging as
game-changers in cyber security. In this paper, we propose a novel defense mechanism for …

Applying data mining techniques to intrusion detection in wireless sensor networks

L Coppolino, S DAntonio, A Garofalo… - … Conference on P2P …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They
have many potential applications for both civil and military tasks. However, the unattended …

A security metrics framework for the cloud

J Luna, H Ghani, D Germanus… - Proceedings of the …, 2011 - ieeexplore.ieee.org
Cloud computing is redefining the on-demand usage of remotely-located, and highly
available computing resources to the user. Unfortunately, while the many economic and …

Architectural optimization for confidentiality under structural uncertainty

M Walter, S Hahner, S Seifermann, T Bures… - … Conference on Software …, 2021 - Springer
More and more connected systems gather and exchange data. This allows building smarter,
more efficient and overall better systems. However, the exchange of data also leads to …

An approach for benchmarking the security of web service frameworks

RA Oliveira, MM Raga, N Laranjeiro, M Vieira - Future Generation …, 2020 - Elsevier
Web services are a popular technology for deploying applications on the Web. They are
supported by frameworks, the middleware that handles most communication aspects …

Novel efficient techniques for real-time cloud security assessment

J Modic, R Trapero, A Taha, J Luna, M Stopar… - Computers & Security, 2016 - Elsevier
Cloud computing offers multiple benefits to users by offloading them of the tasks of setting up
complex infrastructure and costly services. However, these benefits come with a price …