Ahmed Taha
Ahmed Taha
STRD
Adresse e-mail validée de strd-eg.de - Page d'accueil
Titre
Citée par
Citée par
Année
Quantitative reasoning about cloud security using service level agreements
J Luna, A Taha, R Trapero, N Suri
IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015
702015
AHP-based quantitative approach for assessing and comparing cloud security
A Taha, R Trapero, J Luna, N Suri
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
552014
Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
C Busold, A Taha, C Wachsmann, A Dmitrienko, H Seudié, M Sobhani, ...
Proceedings of the third ACM conference on Data and application security and …, 2013
522013
Novel efficient techniques for real-time cloud security assessment
J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri
Computers & Security 62, 1-18, 2016
292016
A novel approach to manage cloud security SLA incidents
R Trapero, J Modic, M Stopar, A Taha, N Suri
Future Generation Computer Systems 72, 193-205, 2017
272017
Formal verification of IEEE 802.16 security sublayer using Scyther tool
AM Taha, AT Abdel-Hamid, S Tahar
2009 International Conference on Network and Service Security, 1-5, 2009
162009
SLA-based service selection for multi-cloud environments
A Taha, S Manzoor, N Suri
2017 IEEE International Conference on Edge Computing (EDGE), 65-72, 2017
122017
C'mon: Monitoring the compliance of cloud services to contracted properties
S Alboghdady, S Winter, A Taha, H Zhang, N Suri
Proceedings of the 12th International Conference on Availability …, 2017
112017
Identifying and utilizing dependencies across cloud security services
A Taha, P Metzler, R Trapero, J Luna, N Suri
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
82016
Trust validation of cloud IaaS: a customer-centric approach
S Manzoor, A Taha, N Suri
2016 IEEE Trustcom/BigDataSE/ISPA, 97-104, 2016
62016
Truver: a blockchain for verifying credentials: poster
A Taha, A Zakaria
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 346-348, 2020
22020
A framework for ranking cloud security services
A Taha, R Trapero, J Luna, N Suri
2017 IEEE International Conference on Services Computing (SCC), 322-329, 2017
22017
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure
A Taha, A Zakaria, D Kim, N Suri
2020 IEEE International Conference on Cloud Engineering (IC2E), 134-143, 2020
12020
QRES: Quantitative Reasoning on Encrypted Security SLAs
A Taha, S Boukoros, J Luna, S Katzenbeisser, N Suri
arXiv preprint arXiv:1804.04426, 2018
2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–14