Jesus Luna

Affiliations:
  • Darmstadt University of Technology, Computer Science Department


According to our database1, Jesus Luna authored at least 49 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
QRES: Quantitative Reasoning on Encrypted Security SLAs.
CoRR, 2018

Whetstone: Reliable Monitoring of Cloud Services.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Quantitative Reasoning about Cloud Security Using Service Level Agreements.
IEEE Trans. Cloud Comput., 2017

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

A Framework for Ranking Cloud Security Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

DevOps for Better Software Security in the Cloud Invited Paper.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Quantifiably Trusting the Cloud: Putting Metrics to Work.
IEEE Secur. Priv., 2016

Eliciting metrics for accountability of cloud systems.
Comput. Secur., 2016

Novel efficient techniques for real-time cloud security assessment.
Comput. Secur., 2016

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Identifying and Utilizing Dependencies Across Cloud Security Services.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards.
IEEE Cloud Comput., 2015

Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Technical Implementation and Feasibility.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Trustworthy communications in Vehicular Ad Hoc NETworks.
Proceedings of the IEEE World Forum on Internet of Things, 2014

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Proceedings of the SECRYPT 2014, 2014

On the Feasibility of Side-Channel Attacks in a Virtualized Environment.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

User-Centric Security Assessment of Software Configurations: A Case Study.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Standards for Accountability in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Quantitative assessment of software vulnerabilities based on economic-driven security metrics.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Predictive vulnerability scoring in the context of insufficient information availability.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proceedings of the CLOSER 2013, 2013

2012
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs.
Int. J. Adapt. Resilient Auton. Syst., 2012

Quantitative Assessment of Cloud Security Level Agreements - A Case Study.
Proceedings of the SECRYPT 2012, 2012

Privacy-by-design based on quantitative threat modeling.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Benchmarking cloud security level agreements using quantitative policy trees.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
A Security Metrics Framework for the Cloud.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Data-Centric Privacy Protocol for Intensive Care Grids.
IEEE Trans. Inf. Technol. Biomed., 2010

An interoperability system for authentication and authorisation in VANETs.
Int. J. Auton. Adapt. Commun. Syst., 2010

A framework for financial botnet analysis.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Benchmarking IP blacklists for financial botnet detection.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2008
A Dynamic Validation Infrastructure for Interoperable Grid Services.
PhD thesis, 2008

Using Desktop Grids to Securely Store e-Health Data.
ERCIM News, 2008

Providing security to the Desktop Data Grid.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Data Privacy considerations in Intensive Care Grids.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008

A Data-Centric Security Analysis Of ICGrid.
Proceedings of the Grid Computing, 2008

Using gLite to Implement a Secure ICGrid.
Proceedings of the Grid and Services Evolution, 2008

Geolocation-Based Trust for Vanet's Privacy.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Using OGRO and CertiVeR to improve OCSP validation for Grids.
J. Supercomput., 2007

Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Static evaluation of Certificate Policies for GRID PKIs interoperability.
Proceedings of the The Second International Conference on Availability, 2007

2006
OCSP for Grids: Comparing Prevalidation versus Caching.
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006

2005
Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4.
Proceedings of the Public Key Infrastructure, 2005


  Loading...