-
1
-
-
84958527309
-
Interconnection of federated clouds
-
M. Ficco, L. Tasquier, and B. Di Martino, "Interconnection of federated clouds," Studies in Computational Intelligence, vol. 511, pp. 243-248, 2014.
-
(2014)
Studies in Computational Intelligence
, vol.511
, pp. 243-248
-
-
Ficco, M.1
Tasquier, L.2
Di Martino, B.3
-
2
-
-
58949086234
-
-
W. Theilmann, R. Yahyapour, and J. Butler, "Multi-level sla management for service-oriented infrastructures," vol. 5377, pp. 324-335, 2008. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-89897-9 28
-
(2008)
Multi-level Sla Management for Service-oriented Infrastructures
, vol.5377
, pp. 324-335
-
-
Theilmann, W.1
Yahyapour, R.2
Butler, J.3
-
3
-
-
78349233199
-
-
M. Comuzzi, C. Kotsokalis, C. Rathfelder, W. Theilmann, U. Winkler, and G. Zacco, "A framework for multi-level sla management," vol. 6275, pp. 187-196, 2010. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-16132-2 18
-
(2010)
A Framework for Multi-level Sla Management
, vol.6275
, pp. 187-196
-
-
Comuzzi, M.1
Kotsokalis, C.2
Rathfelder, C.3
Theilmann, W.4
Winkler, U.5
Zacco, G.6
-
6
-
-
13844285637
-
-
in Global Grid Forum. The Global Grid Forum (GGF)
-
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, and M. Xu, "Web services agreement specification (ws-agreement)," in Global Grid Forum. The Global Grid Forum (GGF), 2004.
-
(2004)
Web Services Agreement Specification (Ws-agreement)
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Nakata, T.6
Pruyne, J.7
Rofrano, J.8
Tuecke, S.9
Xu, M.10
-
7
-
-
84882403734
-
Security event correlation approach for cloud computing
-
M. Ficco, "Security event correlation approach for cloud computing," High Performance Computing and Networking, vol. 7, no. 3, pp. 173-185, 2013.
-
(2013)
High Performance Computing and Networking
, vol.7
, Issue.3
, pp. 173-185
-
-
Ficco, M.1
-
9
-
-
80052605663
-
-
and T. Publications, Eds
-
I. Ivanov, M. van Sinderen F. Leymann, B. S. SciTePress, and T. Publications, Eds., Towards a cross platform Cloud API. Components for Cloud Federation, 2011.
-
(2011)
Towards A Cross Platform Cloud API. Components for Cloud Federation
-
-
Ivanov, I.1
Van Sinderen, M.2
Leymann, F.3
Scite, B.S.4
-
10
-
-
33847411543
-
A security metric for public key infrastructures
-
V. Casola, A. Mazzeo, N. Mazzocca, and V. Vittorini, "A security metric for public key infrastructures," Journal of Computer Security, vol. 15, no. 2, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.2
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
11
-
-
23844470859
-
A reference model for security level evaluation: Policy and fuzzy techniques
-
January
-
R. Preziosi, M. Rak, L. Troiano, and V. Casola, "A reference model for security level evaluation: Policy and fuzzy techniques," Journal of Universal Computer Science, January 2005.
-
(2005)
Journal of Universal Computer Science
-
-
Preziosi, R.1
Rak, M.2
Troiano, L.3
Casola, V.4
-
12
-
-
84882690392
-
A sla evaluation methodology in service oriented architectures
-
V. Casola, A. Mazzeo, N. Mazzocca, and M. Rak, "A sla evaluation methodology in service oriented architectures," Advances in Information Security, vol. 23, pp. 119-130, 2006.
-
(2006)
Advances in Information Security
, vol.23
, pp. 119-130
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Rak, M.4
-
14
-
-
84874085185
-
An intrusion detection framework for supporting sla assessment in cloud computing
-
M. Ficco, M. Rak, and B. Di Martino, "An intrusion detection framework for supporting sla assessment in cloud computing," Proc. of the 4th IEEE Int. Conf. on Computational Aspects of Social Networks, pp. 244-249, 2012.
-
(2012)
Proc. of the 4th IEEE Int. Conf. on Computational Aspects of Social Networks
, pp. 244-249
-
-
Ficco, M.1
Rak, M.2
Di Martino, B.3
-
15
-
-
84872809506
-
Mosaic-based intrusion detection framework for cloud computing
-
M. Ficco, S. Venticinque, and B. Di Martino, "mosaic-based intrusion detection framework for cloud computing," On the Move to Meaningful Internet Systems: OTM 2012, vol. 7566, pp. 628-644, 2012.
-
(2012)
On the Move to Meaningful Internet Systems: OTM 2012
, vol.7566
, pp. 628-644
-
-
Ficco, M.1
Venticinque, S.2
Di Martino, B.3
-
16
-
-
47749117614
-
Soa and web services: New technologies, new standards-new attacks
-
M. Jensen, N. Gruschka, R. Herkenhoner, and N. Luttenberger, "Soa and web services: new technologies, new standards-new attacks," Proc. of the 5th European Conf. on web services, pp. 35-44, 2007.
-
(2007)
Proc. of the 5th European Conf. on Web Services
, pp. 35-44
-
-
Jensen, M.1
Gruschka, N.2
Herkenhoner, R.3
Luttenberger, N.4
-
18
-
-
84866620439
-
Intrusion tolerance in cloud applications: The mosaic approach
-
M. Ficco and M. Rak, "Intrusion tolerance in cloud applications: The mosaic approach," Proc. of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems, (CISIS'12), pp. 170-176, 2012.
-
(2012)
Proc. of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems, (CISIS'12)
, pp. 170-176
-
-
Ficco, M.1
Rak, M.2
-
20
-
-
84893492159
-
Intrusion detection in cloud computing
-
M. Ficco, L. Tasquier, and R. Aversa, "Intrusion detection in cloud computing," Proc. of the 8th Int. Conf.on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 276-283, 2013.
-
(2013)
Proc. of the 8th Int. Conf.On P2P, Parallel, Grid, Cloud and Internet Computing
, pp. 276-283
-
-
Ficco, M.1
Tasquier, L.2
Aversa, R.3
-
21
-
-
34548131684
-
Integrating software specification into intrusion detection
-
M. Zulkernine, M. Graves, and M. Khan, "Integrating software specification into intrusion detection," Journal on Information Security, vol. 6, pp. 345-357, 2007.
-
(2007)
Journal on Information Security
, vol.6
, pp. 345-357
-
-
Zulkernine, M.1
Graves, M.2
Khan, M.3
-
22
-
-
84954446528
-
Addressing software security risk and mitigations in the life cycle
-
D. Gilliam, J. Powell, E. Haugh, and M. Bishop, "Addressing software security risk and mitigations in the life cycle," Proc. of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03), pp. 201-206, 2003.
-
(2003)
Proc. of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03)
, pp. 201-206
-
-
Gilliam, D.1
Powell, J.2
Haugh, E.3
Bishop, M.4
-
23
-
-
33847617890
-
Intrusion detection aware componentbased system: A specification-based framework
-
M. Hussein and M. Zulkernine, "Intrusion detection aware componentbased system: A specification-based framework," Journal of System and Software, vol. 80, no. 5, pp. 700-710, 2007.
-
(2007)
Journal of System and Software
, vol.80
, Issue.5
, pp. 700-710
-
-
Hussein, M.1
Zulkernine, M.2
-
25
-
-
0036090387
-
Statl-an attack language for state-based intrusion detection
-
S. Eckmann, G. Vigna, and R. Kemmerer, "Statl-an attack language for state-based intrusion detection," Journal of Computer Security, vol. 10, no. 1-2, pp. 71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
27
-
-
33947368645
-
Model-based security analysis in seven steps-A guided tour to the coras method
-
F. den Braber, I. Hogganvik, M. Lund, K. Stlen, and F. Vraalsen, "Model-based security analysis in seven steps-A guided tour to the coras method," BT Technology Journal, vol. 25, no. 1, pp. 101-117, 2007.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Den Braber, F.1
Hogganvik, I.2
Lund, M.3
Stlen, K.4
Vraalsen, F.5
|