Quantitative reasoning about cloud security using service level agreements J Luna, A Taha, R Trapero, N Suri IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015 | 90 | 2015 |
AHP-based quantitative approach for assessing and comparing cloud security A Taha, R Trapero, J Luna, N Suri 2014 IEEE 13th international conference on trust, security and privacy in …, 2014 | 65 | 2014 |
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ... Proceedings of the third ACM conference on Data and application security and …, 2013 | 65 | 2013 |
A novel approach to manage cloud security SLA incidents R Trapero, J Modic, M Stopar, A Taha, N Suri Future Generation Computer Systems 72, 193-205, 2017 | 37 | 2017 |
Novel efficient techniques for real-time cloud security assessment J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri Computers & Security 62, 1-18, 2016 | 37 | 2016 |
SLA-based service selection for multi-cloud environments A Taha, S Manzoor, N Suri 2017 IEEE International Conference on Edge Computing (EDGE), 65-72, 2017 | 28 | 2017 |
Formal verification of IEEE 802.16 security sublayer using Scyther tool AM Taha, AT Abdel-Hamid, S Tahar 2009 International Conference on Network and Service Security, 1-5, 2009 | 18 | 2009 |
C'mon: Monitoring the compliance of cloud services to contracted properties S Alboghdady, S Winter, A Taha, H Zhang, N Suri Proceedings of the 12th International Conference on Availability …, 2017 | 15 | 2017 |
Identifying and utilizing dependencies across cloud security services A Taha, P Metzler, R Trapero, J Luna, N Suri Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 15 | 2016 |
Truver: a blockchain for verifying credentials: poster A Taha, A Zakaria Proceedings of the 35th Annual ACM Symposium on Applied Computing, 346-348, 2020 | 10 | 2020 |
A framework for ranking cloud security services A Taha, R Trapero, J Luna, N Suri 2017 IEEE International Conference on Services Computing (SCC), 322-329, 2017 | 10 | 2017 |
Decentralized runtime monitoring approach relying on the ethereum blockchain infrastructure A Taha, A Zakaria, D Kim, N Suri 2020 IEEE International Conference on Cloud Engineering (IC2E), 134-143, 2020 | 8 | 2020 |
Trust validation of cloud IaaS: a customer-centric approach S Manzoor, A Taha, N Suri 2016 IEEE Trustcom/BigDataSE/ISPA, 97-104, 2016 | 8 | 2016 |
Cloud Security Requirement Based Threat Analysis A Taha, A Lawall, N Suri 2023 International Conference on Computing, Networking and Communications …, 2023 | 1 | 2023 |
QRES: quantitative reasoning on encrypted security SLAs A Taha, S Boukoros, J Luna, S Katzenbeisser, N Suri arXiv preprint arXiv:1804.04426, 2018 | 1 | 2018 |