-
2
-
-
84900006290
-
Security attack mitigation framework for the cloud
-
Colorado Springs, CO
-
E. Datta and N. Goyal, "Security attack mitigation framework for the cloud," in Proceedings of 2014 Annual Reliability and Maintainability Symposium (RAMS), Colorado Springs, CO, 2014, pp. 1-6.
-
(2014)
Proceedings of 2014 Annual Reliability and Maintainability Symposium (RAMS)
, pp. 1-6
-
-
Datta, E.1
Goyal, N.2
-
3
-
-
84904176597
-
A dynamic risk-based access control architecture for cloud computing
-
Krakow, Poland
-
D. R. Dos Santos, C. Merkle Westphall, and C. Becker Westphall, "A dynamic risk-based access control architecture for cloud computing," in Proceedings of 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 2014, pp. 1-9.
-
(2014)
Proceedings of 2014 IEEE Network Operations and Management Symposium (NOMS)
, pp. 1-9
-
-
Dos Santos, D.R.1
Merkle Westphall, C.2
Becker Westphall, C.3
-
4
-
-
84893240983
-
A novel threat and risk assessment mechanism for security controls in service management
-
Coventry, UK
-
P. Wang, K. M. Chao, and C. C. Lo, "A novel threat and risk assessment mechanism for security controls in service management," in Proceedings of 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE), Coventry, UK, 2013, pp. 337-344.
-
(2013)
Proceedings of 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
, pp. 337-344
-
-
Wang, P.1
Chao, K.M.2
Lo, C.C.3
-
6
-
-
84893634359
-
Provably secure online/off-line identity-based signature scheme for wireless sensor network
-
J. Kar, "Provably secure online/off-line identity-based signature scheme for wireless sensor network," IJ Network Security, vol. 16, no. 1, pp. 29-39, 2014.
-
(2014)
IJ Network Security
, vol.16
, Issue.1
, pp. 29-39
-
-
Kar, J.1
-
7
-
-
84925445012
-
Practical deployment of one-pass key establishment protocol on wireless sensor networks
-
M. R. Mishra, J. Kar, and B. Majhi, "Practical deployment of one-pass key establishment protocol on wireless sensor networks," International Journal of Pure and Applied Mathematics, vol. 100, no. 4, pp. 531-542, 2015.
-
(2015)
International Journal of Pure and Applied Mathematics
, vol.100
, Issue.4
, pp. 531-542
-
-
Mishra, M.R.1
Kar, J.2
Majhi, B.3
-
8
-
-
84937028103
-
A novel construction of certificateless signcryption scheme for smart card
-
Boca Raton, FL: Taylor and Francis
-
J. Kar, "A novel construction of certificateless signcryption scheme for smart card," in Case Studies in Secure Computing Achievements and Trends. Boca Raton, FL: Taylor and Francis, 2014, pp. 437-456.
-
(2014)
Case Studies in Secure Computing Achievements and Trends
, pp. 437-456
-
-
Kar, J.1
-
9
-
-
79957876122
-
An attack surface metric
-
P. K. Manadhata and J. M. Wing, "An attack surface metric," IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371-386, 2011.
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.3
, pp. 371-386
-
-
Manadhata, P.K.1
Wing, J.M.2
-
10
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
11
-
-
84873376451
-
Security risk assessment: toward a comprehensive practical risk management
-
D. V. Bernardo, "Security risk assessment: toward a comprehensive practical risk management," International Journal of Information and Computer Security, vol. 5, no. 2, pp. 77-104, 2012.
-
(2012)
International Journal of Information and Computer Security
, vol.5
, Issue.2
, pp. 77-104
-
-
Bernardo, D.V.1
|