Follow
Ahmed Taha
Ahmed Taha
IU AS
No verified email
Title
Cited by
Cited by
Year
Quantitative reasoning about cloud security using service level agreements
J Luna, A Taha, R Trapero, N Suri
IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015
902015
AHP-based quantitative approach for assessing and comparing cloud security
A Taha, R Trapero, J Luna, N Suri
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
652014
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ...
Proceedings of the third ACM conference on Data and application security and …, 2013
652013
A novel approach to manage cloud security SLA incidents
R Trapero, J Modic, M Stopar, A Taha, N Suri
Future Generation Computer Systems 72, 193-205, 2017
372017
Novel efficient techniques for real-time cloud security assessment
J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri
Computers & Security 62, 1-18, 2016
372016
SLA-based service selection for multi-cloud environments
A Taha, S Manzoor, N Suri
2017 IEEE International Conference on Edge Computing (EDGE), 65-72, 2017
282017
Formal verification of IEEE 802.16 security sublayer using Scyther tool
AM Taha, AT Abdel-Hamid, S Tahar
2009 International Conference on Network and Service Security, 1-5, 2009
182009
C'mon: Monitoring the compliance of cloud services to contracted properties
S Alboghdady, S Winter, A Taha, H Zhang, N Suri
Proceedings of the 12th International Conference on Availability …, 2017
152017
Identifying and utilizing dependencies across cloud security services
A Taha, P Metzler, R Trapero, J Luna, N Suri
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
152016
Truver: a blockchain for verifying credentials: poster
A Taha, A Zakaria
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 346-348, 2020
102020
A framework for ranking cloud security services
A Taha, R Trapero, J Luna, N Suri
2017 IEEE International Conference on Services Computing (SCC), 322-329, 2017
102017
Decentralized runtime monitoring approach relying on the ethereum blockchain infrastructure
A Taha, A Zakaria, D Kim, N Suri
2020 IEEE International Conference on Cloud Engineering (IC2E), 134-143, 2020
82020
Trust validation of cloud IaaS: a customer-centric approach
S Manzoor, A Taha, N Suri
2016 IEEE Trustcom/BigDataSE/ISPA, 97-104, 2016
82016
Cloud Security Requirement Based Threat Analysis
A Taha, A Lawall, N Suri
2023 International Conference on Computing, Networking and Communications …, 2023
12023
QRES: quantitative reasoning on encrypted security SLAs
A Taha, S Boukoros, J Luna, S Katzenbeisser, N Suri
arXiv preprint arXiv:1804.04426, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–15