Security as a service using an SLA-based approach via SPECS M Rak, N Suri, J Luna, D Petcu, V Casola, U Villano 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 103 | 2013 |
Quantitative reasoning about cloud security using service level agreements J Luna, A Taha, R Trapero, N Suri IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015 | 90 | 2015 |
Benchmarking cloud security level agreements using quantitative policy trees J Luna Garcia, R Langenberg, N Suri Proceedings of the 2012 ACM Workshop on Cloud computing security workshop …, 2012 | 85 | 2012 |
Leveraging the potential of cloud security service-level agreements through standards J Luna, N Suri, M Iorga, A Karmel IEEE Cloud Computing 2 (3), 32-40, 2015 | 66 | 2015 |
AHP-based quantitative approach for assessing and comparing cloud security A Taha, R Trapero, J Luna, N Suri 2014 IEEE 13th international conference on trust, security and privacy in …, 2014 | 65 | 2014 |
A security metrics framework for the cloud J Luna, H Ghani, D Germanus, N Suri Proceedings of the international conference on security and cryptography …, 2011 | 63 | 2011 |
Geolocation-based trust for vanet's privacy J Serna, J Luna, M Medina 2008 The Fourth International Conference on Information Assurance and …, 2008 | 50 | 2008 |
Quantitative assessment of software vulnerabilities based on economic-driven security metrics H Ghani, J Luna, N Suri 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 47 | 2013 |
Quantitative assessment of cloud security level agreements: A case study J Luna, H Ghani, T Vateva, N Suri Proc. of Security and Cryptography 2 (6), 64-73, 2012 | 47 | 2012 |
Privacy-by-design based on quantitative threat modeling J Luna, N Suri, I Krontiris 2012 7th International Conference on Risks and Security of Internet and …, 2012 | 44 | 2012 |
Novel efficient techniques for real-time cloud security assessment J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri Computers & Security 62, 1-18, 2016 | 37 | 2016 |
A framework for financial botnet analysis M Riccardi, D Oro, J Luna, M Cremonini, M Vilanova 2010 eCrime Researchers Summit, 1-7, 2010 | 32 | 2010 |
Devops for better software security in the cloud invited paper MG Jaatun, DS Cruzes, J Luna Proceedings of the 12th International Conference on Availability …, 2017 | 30 | 2017 |
An analysis of security services in grid storage systems D Talia, R Yahyapour, W Ziegler, J Luna, MD Flouris, M Marazakis, ... Grid Middleware and Services: Challenges and Solutions, 171-185, 2008 | 25 | 2008 |
Benchmarking IP blacklists for financial botnet detection D Oro, J Luna, T Felguera, M Vilanova, J Serna 2010 Sixth International Conference on Information Assurance and Security, 62-67, 2010 | 18 | 2010 |
Predictive vulnerability scoring in the context of insufficient information availability H Ghani, J Luna, A Khelil, N Alkadri, N Suri 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 17 | 2013 |
An interoperability system for authentication and authorisation in VANETs V Casola, J Luna, A Mazzeo, M Medina, M Rak, J Serna International Journal of Autonomous and Adaptive Communications Systems 3 (2 …, 2010 | 17 | 2010 |
Providing security to the desktop data grid J Luna, M Flouris, M Marazakis, A Bilas 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008 | 17 | 2008 |
Cloud system D Nuñez, G Fernández, J Luna Procedia Computer Engineering 62, 149-164, 2017 | 16 | 2017 |
Eliciting metrics for accountability of cloud systems D Nuñez, C Fernández-Gago, J Luna Computers & Security 62, 149-164, 2016 | 16 | 2016 |