On technical security issues in cloud computing M Jensen, J Schwenk, N Gruschka, LL Iacono 2009 IEEE international conference on cloud computing, 109-116, 2009 | 1023 | 2009 |
Attack surfaces: A taxonomy for attacks on cloud services N Gruschka, M Jensen 2010 IEEE 3rd international conference on cloud computing, 276-279, 2010 | 291 | 2010 |
All your clouds are belong to us: security analysis of cloud management interfaces J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ... Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011 | 228 | 2011 |
Security and privacy-enhancing multicloud architectures JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013 | 208 | 2013 |
Vulnerable cloud: Soap message security validation revisited N Gruschka, LL Iacono 2009 IEEE International Conference on Web Services, 625-631, 2009 | 195 | 2009 |
A survey of attacks on web services: Classification and countermeasures M Jensen, N Gruschka, R Herkenhöner Computer Science-Research and Development 24, 185-197, 2009 | 187 | 2009 |
Soa and web services: New technologies, new standards-new attacks M Jensen, N Gruschka, R Herkenhoner, N Luttenberger Fifth European Conference on Web Services (ECOWS'07), 35-44, 2007 | 158 | 2007 |
Privacy issues and data protection in big data: a case study analysis under GDPR N Gruschka, V Mavroeidis, K Vishi, M Jensen 2018 IEEE International Conference on Big Data (Big Data), 5027-5033, 2018 | 113 | 2018 |
Protecting web services from dos attacks by soap message validation N Gruschka, N Luttenberger Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006 | 90 | 2006 |
Security prospects through cloud computing by adopting multiple clouds M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono 2011 IEEE 4th international conference on cloud computing, 565-572, 2011 | 76 | 2011 |
The impact of flooding attacks on network-based services M Jensen, N Gruschka, N Luttenberger 2008 Third International Conference on Availability, Reliability and …, 2008 | 67 | 2008 |
Server-side streaming processing of ws-security N Gruschka, M Jensen, LL Iacono, N Luttenberger IEEE Transactions on Services Computing 4 (4), 272-285, 2011 | 44 | 2011 |
Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services. N Gruschka, N Luttenberger, R Herkenhöner SWWS, 80-86, 2006 | 40 | 2006 |
Method and system for user authentication N Gruschka, LL Iacono, GA Kohring, H Rajasekaran US Patent App. 13/500,503, 2012 | 26 | 2012 |
On Technical Security Issues in Cloud Computing N Gruschka, LL Iancono, M Jensen, J Schwenk PROC 9, 110-112, 2009 | 22 | 2009 |
Event-based application of WS-security policy on SOAP messages N Gruschka, M Jensen, T Dziuk Proceedings of the 2007 ACM workshop on Secure web services, 1-8, 2007 | 22 | 2007 |
A stateful web service firewall for BPEL N Gruschka, M Jensen, N Luttenberger IEEE International Conference on Web Services (ICWS 2007), 142-149, 2007 | 21 | 2007 |
Flooding attack issues of web services and service-oriented architectures M Jensen, N Gruschka INFORMATIK 2008. Beherrschbare Systeme–dank Informatik. Band 1, 2008 | 18 | 2008 |
WS-SecurityPolicy decision and enforcement for Web Service firewalls N Gruschka, R Herkenhöner, N Luttenberger Proceedings of the IEEE/IST Workshop on Monitoring, Attack Detection and …, 2006 | 17 | 2006 |
Sicherheit in Kommunikationsnetzen C Sorge, LL Iacono, N Gruschka Sicherheit in Kommunikationsnetzen, 2013 | 16 | 2013 |