Meiko Jensen
Meiko Jensen
Southern Denmark University
Verified email at
Cited by
Cited by
On technical security issues in cloud computing
M Jensen, J Schwenk, N Gruschka, LL Iacono
Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 109-116, 2009
Attack surfaces: A taxonomy for attacks on cloud services
N Gruschka, M Jensen
Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 276-279, 2010
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
Dependable and Secure Computing, IEEE Transactions on 10 (4), 212-224, 2013
A survey of attacks on web services
M Jensen, N Gruschka, R Herkenhöner
Computer Science-Research and Development 24 (4), 185-197, 2009
Soa and web services: New technologies, new standards-new attacks
M Jensen, N Gruschka, R Herkenhoner, N Luttenberger
Web Services, 2007. ECOWS'07. Fifth European Conference on, 35-44, 2007
On Breaking SAML: Be Whoever You Want to Be.
J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen
USENIX Security Symposium, 397-412, 2012
Challenges of privacy protection in big data analytics
M Jensen
Big Data (BigData Congress), 2013 IEEE International Congress on, 235-238, 2013
Analysis of signature wrapping attacks and countermeasures
S Gajek, M Jensen, L Liao, J Schwenk
Web Services, 2009. ICWS 2009. IEEE International Conference on, 575-582, 2009
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
Cloud Computing (CLOUD), 2011 IEEE International Conference on, 565-572, 2011
Security prospects through cloud computing by adopting multiple clouds
JM Bohli, M Jensen, N Gruschka, J Schwenk, LLL Iacono
Proc. IEEE Fourth Int’l Conf. Cloud Computing (CLOUD), 2011
The impact of flooding attacks on network-based services
M Jensen, N Gruschka, N Luttenberger
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
A security modeling approach for web-service-based business processes
M Jensen, S Feja
Engineering of Computer Based Systems, 2009. ECBS 2009. 16th Annual IEEE …, 2009
Server-side streaming processing of ws-security
N Gruschka, M Jensen, LL Iacono, N Luttenberger
Services Computing, IEEE Transactions on 4 (4), 272-285, 2011
On the effectiveness of xml schema validation for countering xml signature wrapping attacks
M Jensen, C Meyer, J Somorovsky, J Schwenk
Securing Services on the Cloud (IWSSC), 2011 1st International Workshop on, 7-13, 2011
Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing.
M Jensen, S Schäge, J Schwenk
IEEE CLOUD, 540-541, 2010
Crouching tiger-hidden payload: security risks of scalable vectors graphics
M Heiderich, T Frosch, M Jensen, T Holz
Proceedings of the 18th ACM conference on Computer and communications …, 2011
The accountability problem of flooding attacks in service-oriented architectures
M Jensen, J Schwenk
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
The curse of namespaces in the domain of xml signature
M Jensen, L Liao, J Schwenk
Proceedings of the 2009 ACM workshop on Secure web services, 29-36, 2009
Event-based application of ws-security policy on soap messages
N Gruschka, M Jensen, T Dziuk
Proceedings of the 2007 ACM workshop on Secure web services, 1-8, 2007
The system can't perform the operation now. Try again later.
Articles 1–20