On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A systematic mapping study of security concepts for configurable data storages

R May, C Biermann, J Krüger, G Saake… - Proceedings of the 26th …, 2022 - dl.acm.org
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …

[HTML][HTML] A self-adaptation-based approach to resilience improvement of complex internets of utility systems

L Coppolino, S D'Antonio, R Nardone… - Environment Systems and …, 2023 - Springer
Resilience improvement of complex internets of utility systems is still an open issue for the
current research. Proposed solutions fail to implement an integrated approach to detection …

Privacy-preserving credit scoring via functional encryption

L Andolfo, L Coppolino, S D'Antonio, G Mazzeo… - … Science and Its …, 2021 - Springer
The majority of financial organizations managing confidential data are aware of security
threats and leverage widely accepted solutions (eg, storage encryption, transport-level …

An abstract reasoning architecture for privacy policies monitoring

F Amato, L Coppolino, S D'Antonio, N Mazzocca… - Future Generation …, 2020 - Elsevier
Privacy is a topic of increasing interest not only for scientific communities, but also for public
opinion and for regulatory bodies from all Countries. The problem is that privacy …

[PDF][PDF] Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.

L Coppolino, S D'Antonio, G Mazzeo, L Romano… - ITASEC, 2021 - core.ac.uk
Abstract According to McAfee Labs, even in 2019, the eHealth sector is confirmed as one of
the most critical in terms of cybersecurity incidents. It is estimated that more than 176 million …

Securing smart metering applications in untrusted clouds with the securecloud platform

RJ Riella, LM Iantorno, LCR Junior, D Seidel… - Proceedings of the 1st …, 2018 - dl.acm.org
Data security in smart metering applications is important not only to secure the customer
privacy but also to protect the power utility against fraud attempts. Usual deployment of …

An approach for securing cloud-based wide area monitoring of smart grid systems

L Coppolino, S D'Antonio, G Mazzeo… - Advances in Network …, 2019 - Springer
Computing power and flexibility provided by cloud technologies represent an opportunity for
Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular …

Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain

L Coppolino, S D'Antonio, G Mazzeo… - … Journal of Critical …, 2019 - inderscienceonline.com
The interconnection of organisations from distributed, heterogeneous, and autonomous
domains having different regulations often requires a trusted third-party gateway to translate …

Confidential remote computing

KA Küçük - 2022 - ora.ox.ac.uk
Since their market launch in late 2015, trusted hardware enclaves have revolutionised the
computing world with data-in-use protections. Their security features of confidentiality …