Follow
Meiko Jensen
Meiko Jensen
Senior Lecturer for Cybersecurity at Karlstad University, Sweden
Verified email at kau.se
Title
Cited by
Cited by
Year
On technical security issues in cloud computing
M Jensen, J Schwenk, N Gruschka, LL Iacono
2009 IEEE international conference on cloud computing, 109-116, 2009
10852009
Attack surfaces: A taxonomy for attacks on cloud services
N Gruschka, M Jensen
2010 IEEE 3rd international conference on cloud computing, 276-279, 2010
3162010
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
2342011
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013
2162013
A survey of attacks on web services: Classification and countermeasures
M Jensen, N Gruschka, R Herkenhöner
Computer Science-Research and Development 24, 185-197, 2009
1942009
Privacy issues and data protection in big data: a case study analysis under GDPR
N Gruschka, V Mavroeidis, K Vishi, M Jensen
2018 IEEE International Conference on Big Data (Big Data), 5027-5033, 2018
1742018
Protection goals for privacy engineering
M Hansen, M Jensen, M Rost
2015 IEEE Security and Privacy Workshops, 159-166, 2015
1612015
Soa and web services: New technologies, new standards-new attacks
M Jensen, N Gruschka, R Herkenhoner, N Luttenberger
Fifth European Conference on Web Services (ECOWS'07), 35-44, 2007
1602007
On breaking {SAML}: Be whoever you want to be
J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen
21st USENIX Security Symposium (USENIX Security 12), 397-412, 2012
1442012
Challenges of privacy protection in big data analytics
M Jensen
2013 IEEE International Congress on Big Data, 235-238, 2013
1202013
Analysis of signature wrapping attacks and countermeasures
S Gajek, M Jensen, L Liao, J Schwenk
2009 IEEE international conference on web services, 575-582, 2009
872009
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
842011
The impact of flooding attacks on network-based services
M Jensen, N Gruschka, N Luttenberger
2008 Third International Conference on Availability, Reliability and …, 2008
662008
A security modeling approach for web-service-based business processes
M Jensen, S Feja
2009 16th Annual IEEE International Conference and Workshop on the …, 2009
492009
Server-side streaming processing of ws-security
N Gruschka, M Jensen, LL Iacono, N Luttenberger
IEEE Transactions on Services Computing 4 (4), 272-285, 2011
482011
On the effectiveness of xml schema validation for countering xml signature wrapping attacks
M Jensen, C Meyer, J Somorovsky, J Schwenk
2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 7-13, 2011
462011
Towards an anonymous access control and accountability scheme for cloud computing
M Jensen, S Schäge, J Schwenk
2010 IEEE 3rd International Conference on Cloud Computing, 540-541, 2010
452010
Crouching tiger-hidden payload: security risks of scalable vectors graphics
M Heiderich, T Frosch, M Jensen, T Holz
Proceedings of the 18th ACM conference on Computer and communications …, 2011
392011
Challenges in data science: a complex systems perspective
A Carbone, M Jensen, AH Sato
Chaos, Solitons & Fractals 90, 1-7, 2016
342016
The accountability problem of flooding attacks in service-oriented architectures
M Jensen, J Schwenk
2009 International Conference on Availability, Reliability and Security, 25-32, 2009
342009
The system can't perform the operation now. Try again later.
Articles 1–20