Items where Author is "Trapero, R."

Group by: Item Type | No Grouping
Number of items: 14.

Journal Article

Luna, J. and Taha, A. and Trapero, R. and Suri, Neeraj (2017) Quantitative Reasoning about Cloud Security Using Service Level Agreements. IEEE Transactions on Cloud Computing, 5 (3). pp. 457-471. ISSN 2168-7161

Trapero, R. and Modic, J. and Stopar, M. and Taha, A. and Suri, Neeraj (2017) A novel approach to manage cloud security SLA incidents. Future Generation Computer Systems, 72. pp. 193-205. ISSN 0167-739X

Modic, J. and Trapero, R. and Taha, A. and Luna, J. and Stopar, M. and Suri, Neeraj (2016) Novel efficient techniques for real-time cloud security assessment. Computers and Security, 62. pp. 1-18. ISSN 0167-4048

Trapero, R. and Luna, J. and Suri, Neeraj (2016) Quantifiably Trusting the Cloud: Putting Metrics to Work. IEEE Security and Privacy Magazine, 14 (3). pp. 73-77. ISSN 1540-7993

Del Alamo, J.M. and Trapero, R. and Martin, Y.S. and Yelmo, J.C. and Suri, Neeraj (2015) Assessing privacy capabilities of cloud service providers. IEEE Latin America Transactions, 13 (11). pp. 3634-3641. ISSN 1548-0992

Contribution in Book/Report/Proceedings

Vateva-Gurova, T. and Manzoor, S. and Trapero, R. and Suri, Neeraj and E., Marin Tordera and K., Lampropoulos (2019) Protecting Cloud-Based CIs : Covert Channel Vulnerabilities at the Resource Level. In: Information and Operational Technology Security Systems : First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11398 . Springer-Verlag, pp. 27-38. ISBN 9783030120849

Manzoor, S. and Vateva-Gurova, T. and Trapero, R. and Suri, Neeraj (2019) Threat Modeling the Cloud : An Ontology Based Approach. In: IOSec 2018 : Information and Operational Technology Security Systems. Lecture Notes in Computer Science . Springer-Verlag, Cham, pp. 61-72. ISBN 9783030120849

Zhang, H. and Luna, J. and Suri, Neeraj and Trapero, R. (2018) Flashlight : A novel monitoring path identification schema for securing cloud services. In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security :. ACM. ISBN 9781450364485

Zhang, H. and Luna, J. and Trapero, R. and Suri, Neeraj (2018) Whetstone : Reliable monitoring of cloud services. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP) :. IEEE, pp. 115-122. ISBN 9781538647066

Zhang, H. and Trapero, R. and Luna, J. and Suri, Neeraj and X., Liu and U., Bellur (2017) DeQAM : A Dependency Based Indirect Monitoring Approach for Cloud Services. In: 2017 IEEE International Conference on Services Computing (SCC) :. IEEE, pp. 27-34. ISBN 9781538620069

Taha, A. and Trapero, R. and Luna, J. and Suri, Neeraj (2017) A Framework for Ranking Cloud Security Services. In: 2017 IEEE International Conference on Services Computing (SCC) :. IEEE, pp. 322-329. ISBN 9781538620069

Zhang, H. and Taha, A. and Trapero, R. and Luna, J. and Suri, Neeraj (2016) SENTRY : A novel approach for mitigating application layer DDoS threats. In: 2016 IEEE Trustcom/BigDataSE/ISPA :. IEEE, pp. 465-472. ISBN 9781509032068

Taha, A. and Metzler, P. and Trapero, R. and Luna, J. and Suri, Neeraj (2016) Identifying and utilizing dependencies across cloud security services. In: ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security :. ACM, pp. 329-340. ISBN 9781450342339

Taha, A. and Trapero, R. and Luna, J. and Suri, Neeraj (2014) AHP-based quantitative approach for assessing and comparing cloud security. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications :. IEEE, pp. 284-291. ISBN 9781479965137

This list was generated on Thu Apr 24 10:38:30 2025 UTC.