Rubén Trapero

Orcid: 0000-0001-9598-7183

According to our database1, Rubén Trapero authored at least 27 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture.
Digit., December, 2021

Security Management Architecture for NFV/SDN-Aware IoT Systems.
IEEE Internet Things J., 2019

Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

Telco Cloud Resilience: Synergies Between Fault and Security Management.
Proceedings of the European Conference on Networks and Communications, 2019

Whetstone: Reliable Monitoring of Cloud Services.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.
Proceedings of the Information and Operational Technology Security Systems, 2018

Threat Modeling the Cloud: An Ontology Based Approach.
Proceedings of the Information and Operational Technology Security Systems, 2018

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Quantitative Reasoning about Cloud Security Using Service Level Agreements.
IEEE Trans. Cloud Comput., 2017

A novel approach to manage cloud security SLA incidents.
Future Gener. Comput. Syst., 2017

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

A Framework for Ranking Cloud Security Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

Quantifiably Trusting the Cloud: Putting Metrics to Work.
IEEE Secur. Priv., 2016

Novel efficient techniques for real-time cloud security assessment.
Comput. Secur., 2016

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Identifying and Utilizing Dependencies Across Cloud Security Services.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Blended Identity: Pervasive IdM for Continuous Authentication.
IEEE Secur. Priv., 2015

Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Privacy-Considerate Framework for Identity Management in Mobile Services.
Mob. Networks Appl., 2011

A user-centric approach to service creation and delivery over next generation networks.
Comput. Commun., 2011

Self-service Privacy: User-Centric Privacy for Network-Centric Identity.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Identity management and web services as service ecosystem drivers in converged networks.
IEEE Commun. Mag., 2009

XDM-Compatible Service Repository for User-Centric Service Creation and Discovery.
Proceedings of the IEEE International Conference on Web Services, 2009

Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services.
Proceedings of the Future of Identity in the Information Society, 2007

User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services.
Proceedings of the Service-Oriented Computing, 2007