Muhammad I. H. Sukmana

Orcid: 0000-0002-1652-9895

According to our database1, Muhammad I. H. Sukmana authored at least 22 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Security improvements for enterprise file sychronization and sharing system (Sicherheitsverbesserungen für Enterprise File Synchronization und Sharing System)
PhD thesis, 2022

2021
Continuous auditing and threat detection in multi-cloud infrastructure.
Comput. Secur., 2021

Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure.
IEEE Access, 2020

A Brokerage Approach for Secure Multi-Cloud Storage Resource Management.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
Security Chaos Engineering for Cloud Services: Work In Progress.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Unified Cloud Access Control Model for Cloud Storage Broker.
Proceedings of the 33rd International Conference on Information Networking, 2019

Secure Deduplication on Public Cloud Storage.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

Holistic Strategy-Based Threat Model for Organizations.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era.
Proceedings of the Security and Privacy in Communication Networks, 2018

A threat modeling approach for cloud storage brokerage and file sharing systems.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker.
Proceedings of the 2018 International Conference on Information Networking, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Integrating Continuous Security Assessments in Microservices and Cloud Native Applications.
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017


  Loading...