Home > Research > Browse

Results for Security requirements

Publications & Outputs

  1. Understanding Security Requirements for Industrial Control System Supply Chains

    Hou, Y., Such, J. & Rashid, A., 5/09/2019, 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). IEEE, p. 50-53 4 p. 8823698

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In : International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to journalJournal article

  3. A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In : IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to journalJournal article

  7. AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper