Ahmed Taha

Affiliations:
  • STRD, Mannheim, Germany
  • TU Darmstadt, Germany


According to our database1, Ahmed Taha authored at least 16 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cloud Security Requirement Based Threat Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2020
Truver: a blockchain for verifying credentials: poster.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

2018
Quantitative Trust Assessment in the Cloud.
PhD thesis, 2018

QRES: Quantitative Reasoning on Encrypted Security SLAs.
CoRR, 2018

2017
Quantitative Reasoning about Cloud Security Using Service Level Agreements.
IEEE Trans. Cloud Comput., 2017

A novel approach to manage cloud security SLA incidents.
Future Gener. Comput. Syst., 2017

SLA-Based Service Selection for Multi-Cloud Environments.
Proceedings of the IEEE International Conference on Edge Computing, 2017

A Framework for Ranking Cloud Security Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Novel efficient techniques for real-time cloud security assessment.
Comput. Secur., 2016

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Validation of Cloud IaaS: A Customer-centric Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Identifying and Utilizing Dependencies Across Cloud Security Services.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2014
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013


  Loading...