Kennedy Torkura

Orcid: 0000-0001-8967-1035

According to our database1, Kennedy Torkura authored at least 26 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Continuous auditing and threat detection in multi-cloud infrastructure.
Comput. Secur., 2021

A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure.
IEEE Access, 2020

A Brokerage Approach for Secure Multi-Cloud Storage Resource Management.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses.
CoRR, 2019

Security Chaos Engineering for Cloud Services: Work In Progress.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Unified Cloud Access Control Model for Cloud Storage Broker.
Proceedings of the 33rd International Conference on Information Networking, 2019

Secure Deduplication on Public Cloud Storage.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

Holistic Strategy-Based Threat Model for Organizations.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era.
Proceedings of the Security and Privacy in Communication Networks, 2018

A threat modeling approach for cloud storage brokerage and file sharing systems.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker.
Proceedings of the 2018 International Conference on Information Networking, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Integrating Continuous Security Assessments in Microservices and Cloud Native Applications.
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Towards Vulnerability Assessment as a Service in OpenStack Clouds.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2015
Towards Cloud-Aware Vulnerability Assessments.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Secure access control for multi-cloud resources.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

Application of quantitative security metrics in cloud computing.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

A proposed framework for proactive vulnerability assessments in cloud deployments.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015


  Loading...