Folgen
Kennedy Aondona Torkura
Titel
Zitiert von
Zitiert von
Jahr
Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
IEEE Access 8, 123044-123060, 2020
652020
Integrating continuous security assessments in microservices and cloud native applications
KA Torkura, MIH Sukmana, C Meinel
Proceedings of the10th International Conference on Utility and Cloud …, 2017
532017
Continuous auditing and threat detection in multi-cloud infrastructure
KA Torkura, MIH Sukmana, F Cheng, C Meinel
Computers & Security 102, 102124, 2021
512021
Secure access control for multi-cloud resources
H Graupner, K Torkura, P Berger, C Meinel, M Schnjakin
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
302015
A cyber risk based moving target defense mechanism for microservice architectures
KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
282018
Leveraging cloud native design patterns for security-as-a-service applications
KA Torkura, MIH Sukmana, F Cheng, C Meinel
2017 IEEE International Conference on Smart Cloud (SmartCloud), 90-97, 2017
272017
Unified cloud access control model for cloud storage broker
MIH Sukmana, KA Torkura, H Graupner, F Cheng, C Meinel
2019 international conference on information networking (ICOIN), 60-65, 2019
182019
Security chaos engineering for cloud services: Work in progress
KA Torkura, MIH Sukmana, F Cheng, C Meinel
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
162019
Holistic strategy-based threat model for organizations
M Meinig, MIH Sukmana, KA Torkura, C Meinel
Procedia Computer Science 151, 100-107, 2019
162019
Securing cloud storage brokerage systems through threat models
KA Torkura, MIH Sukmana, M Meinig, AVDM Kayem, F Cheng, ...
2018 IEEE 32nd international conference on advanced information networking …, 2018
162018
Csbauditor: Proactive security risk analysis for cloud storage broker systems
KA Torkura, MIH Sukmana, T Strauss, H Graupner, F Cheng, C Meinel
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
152018
Slingshot-automated threat detection and incident response in multi cloud storage systems
KA Torkura, MIH Sukmana, F Cheng, C Meinel
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
142019
Application of quantitative security metrics in cloud computing
KA Torkura, F Cheng, C Meinel
2015 10th International Conference for Internet Technology and Secured …, 2015
132015
Cavas: Neutralizing application and container security vulnerabilities in the cloud native era
KA Torkura, MIH Sukmana, F Cheng, C Meinel
Security and Privacy in Communication Networks: 14th International …, 2018
122018
A proposed framework for proactive vulnerability assessments in cloud deployments
KA Torkura, F Cheng, C Meinel
2015 10th International Conference for Internet Technology and Secured …, 2015
102015
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker
MIH Sukmana, KA Torkura, F Cheng, C Meinel, H Graupner
2018 International conference on information networking (ICOIN), 44-49, 2018
92018
Towards cloud-aware vulnerability assessments
KA Torkura, C Meinel
2015 11th International Conference on Signal-Image Technology & Internet …, 2015
92015
Redesign cloudraid for flexible and secure enterprise file sharing over public cloud storage
MIH Sukmana, KA Torkura, C Meinel, H Graupner
Proceedings of the 10th International Conference on Security of Information …, 2017
72017
Towards vulnerability assessment as a service in openstack clouds
KA Torkura, C Meinel
2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN …, 2016
62016
A threat modeling approach for cloud storage brokerage and file sharing systems
KA Torkura, MIH Sukmana, M Meinig, F Cheng, C Meinel, H Graupner
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-5, 2018
52018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20