Valentina Casola

According to our database1, Valentina Casola authored at least 80 papers between 2002 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Security-by-design in multi-cloud applications: An optimization approach.
Inf. Sci., 2018

Per-service security SLAs for cloud security management: model and implementation.
IJGUC, 2018

Editorial: Security and privacy protection vs sustainable development.
Computers & Security, 2018

A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Automatically Enforcing Security SLAs in the Cloud.
IEEE Trans. Services Computing, 2017

MUSA Deployer: Deployment of Multi-cloud Applications.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Towards Model-Based Security Assessment of Cloud Applications.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

An Automatic Tool for Benchmark Testing of Cloud Applications.
Proceedings of the CLOSER 2017, 2017

A Security Metric Catalogue for Cloud Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Cloud Computing for Earth Surface Deformation Analysis via Spaceborne Radar Imaging: A Case Study.
IEEE Trans. Cloud Computing, 2016

SLA-based Secure Cloud Application Development.
Scalable Computing: Practice and Experience, 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Computing, 2016

Per-Service Security SLa: A New Model for Security Management in Clouds.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Cloud Security: From Per-Provider to Per-Service Security SLAs.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Security SLA in Next Generation Data Centers, the SPECS Approach.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study.
Proceedings of the CLOSER 2016, 2016

Methodology to Obtain the Security Controls in Multi-cloud Applications.
Proceedings of the CLOSER 2016, 2016

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016

2015
An On-Demand Web Tool for the Unsupervised Retrieval of Earth's Surface Deformation from SAR Data: The P-SBAS Service within the ESA G-POD Environment.
Remote Sensing, 2015

SLA-Based Secure Cloud Application Development: The SPECS Framework.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Unsupervised on-demand web service for DInSAR processing: The P-SBAS implementation within the ESA G-POD environment.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications.
Proceedings of the CLOSER 2015, 2015

Security Monitoring in the Cloud: An SLA-Based Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

DoS Protection in the Cloud through the SPECS Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
Developing Secure Cloud Applications.
Scalable Computing: Practice and Experience, 2014

An SLA-based brokering platform to provide sensor networks as-a-service.
IJBPIM, 2014

Manipulating the attacker's view of a system's attack surface.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Cloud Platform for Scientific Advances in Earth Surface Interferometric SAR Image Analysis.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

A Cloud Application for Security Service Level Agreement Evaluation.
Proceedings of the CLOSER 2014, 2014

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud.
Proceedings of the CLOSER 2014, 2014

On the Adoption of Security SLAs in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes.
IJCCBS, 2013

A semantic approach for fine-grain access control of e-health documents.
Logic Journal of the IGPL, 2013

The CloudGrid approach: Security analysis and performance evaluation.
Future Generation Comp. Syst., 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

A Probabilistic Framework for Distributed Localization of Attackers in MANETs.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

An FPGA-Based Smart Classifier for Decision Support Systems.
Proceedings of the Intelligent Distributed Computing VII, 2013

Towards Automatic Generation of Hardware Classifiers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

An SLA-Based Approach to Manage Sensor Networks as-a-Service.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Performance Evaluation of Video Analytics for Surveillance On-Board Trains.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2013

A Compositional Modelling Approach for Large Sensor Networks Design.
Proceedings of the Eighth International Conference on P2P, 2013

On the Adoption of FPGA for Protecting Cyber Physical Infrastructures.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs.
IJARAS, 2012

Freight Train monitoring: A Case-Study for the pSHIELD Project.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
A semantic enriched data model for sensor network interoperability.
Simulation Modelling Practice and Theory, 2011

Analysis and Comparison of Security Protocols in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

A Semantic-based Document Processing Framework: A Security Perspective.
Proceedings of the International Conference on Complex, 2011

An Innovative Framework for Securing Unstructured Documents.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
An interoperability system for authentication and authorisation in VANETs.
IJAACS, 2010

Security and Performance Trade-off in PerfCloud.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

A Common Data Model for Sensor Network Integration.
Proceedings of the CISIS 2010, 2010

Identity federation in cloud computing.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

A semantic based methodology to classify and protect sensitive data in medical records.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Reference Architecture for Sensor Networks Integration and Management.
Proceedings of the GeoSensor Networks, Third International Conference, 2009

An AHP-Based Framework for Quality and Security Evaluation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

PerfCloud: Performance-Oriented Integration of Cloud and GRID.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
Self-optimization of secure web services.
Computer Communications, 2008

The REM Framework for Security Evaluation.
Proceedings of the The Third International Conference on Availability, 2008

2007
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures.
Journal of Computer Security, 2007

Optimizing secure Web Services with MAWeS: A case study.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A policy-based evaluation framework for Quality and Security in Service Oriented Architectures.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Building Autonomic and Secure Service Oriented Architectures with MAWeS.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Static evaluation of Certificate Policies for GRID PKIs interoperability.
Proceedings of the The Second International Conference on Availability, 2007

2006
A SLA evaluation methodology in Service Oriented Architectures.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006

2005
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques.
J. UCS, 2005

Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.
Proceedings of the Public Key Infrastructure, 2005

2004
Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture.
Proceedings of the Applied Parallel Computing, 2004

Security Level Evaluation: Policy and Fuzzy Techniques.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure.
Proceedings of the ICETE 2004, 2004

2003
Policy based interoperability in distributed security infrastructures.
Proceedings of the Enhanced Interoperable Systems. Proceedings of the 10th ISPE International Conference on Concurrent Engineering (ISPE CE 2003), 2003

2002
Policy formalization to combine separate systems into larger connected network of trust.
Proceedings of the Network Control and Engineering for QoS, 2002


  Loading...