On technical security issues in cloud computing M Jensen, J Schwenk, N Gruschka, LL Iacono 2009 IEEE international conference on cloud computing, 109-116, 2009 | 1118 | 2009 |
All your clouds are belong to us: security analysis of cloud management interfaces J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ... Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011 | 238 | 2011 |
Security and privacy-enhancing multicloud architectures JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013 | 218 | 2013 |
Vulnerable cloud: Soap message security validation revisited N Gruschka, LL Iacono 2009 IEEE International Conference on Web Services, 625-631, 2009 | 200 | 2009 |
Strategies for health data exchange for secondary, cross-institutional clinical research BS Elger, J Iavindrasana, LL Iacono, H Müller, N Roduit, P Summers, ... Computer methods and programs in biomedicine 99 (3), 230-251, 2010 | 136 | 2010 |
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 265-281, 2018 | 115 | 2018 |
Security prospects through cloud computing by adopting multiple clouds M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono 2011 IEEE 4th international conference on cloud computing, 565-572, 2011 | 86 | 2011 |
Is this really you? An empirical study on risk-based authentication applied in the wild S Wiefling, L Lo Iacono, M Dürmuth ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 78 | 2019 |
Listen to developers! a participatory design study on security warnings for cryptographic apis PL Gorski, Y Acar, L Lo Iacono, S Fahl Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 52 | 2020 |
Guidelines for adopting frontend architectures and patterns in microservices-based systems H Harms, C Rogowski, L Lo Iacono Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 49 | 2017 |
Towards the usability evaluation of security APIs. PL Gorski, LL Iacono HAISA 10, 252-265, 2016 | 48 | 2016 |
@ neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services S Benkner, A Arbona, G Berti, A Chiarini, R Dunlop, G Engelbrecht, ... IEEE transactions on information technology in biomedicine 14 (6), 1365-1377, 2010 | 48 | 2010 |
Server-side streaming processing of ws-security N Gruschka, M Jensen, LL Iacono, N Luttenberger IEEE Transactions on Services Computing 4 (4), 272-285, 2011 | 47 | 2011 |
Multi-centric universal pseudonymisation for secondary use of the EHR. LL Iacono Studies in health technology and informatics 126, 239, 2007 | 44 | 2007 |
More than just good passwords? A study on usability and security perceptions of risk-based authentication S Wiefling, M Dürmuth, L Lo Iacono Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 41 | 2020 |
I do and i understand. not yet true for security apis. so sad LL Iacono, PL Gorski European Workshop on Usable Security 4, 40, 2017 | 40 | 2017 |
Your cache has fallen: Cache-poisoned denial-of-service attack HV Nguyen, LL Iacono, H Federrath Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 37 | 2019 |
Security challenges of the 3gpp 5g service based architecture HC Rudolph, A Kunz, LL Iacono, HV Nguyen IEEE Communications Standards Magazine 3 (1), 60-65, 2019 | 33 | 2019 |
Evaluation of account recovery strategies with FIDO2-based passwordless authentication J Kunke, S Wiefling, M Ullmann, LL Iacono arXiv preprint arXiv:2105.12477, 2021 | 31 | 2021 |
Method and system for user authentication N Gruschka, LL Iacono, GA Kohring, H Rajasekaran US Patent App. 13/500,503, 2012 | 31 | 2012 |