top of page

Publications

202​0

  1. A. Taha, A. Zakaria, D. Kim, N. Suri. Invited Paper: Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure; Proc. of 8th IEEE International Conference on Cloud Computing (IC2E) – acceptance rate: 33.3%

  2. [POSTER] A. Taha, A. Zakaria. Truver - A Blockchain for Verifying Credentials; Proc. of  the 35th ACM/SIGAPP Symposium On Applied Computing (SAC) – acceptance rate: 24%

 

2018

  1. A. Taha, S. Boukoros, J. Luna, S. Katzenbeisser, N. Suri. QRES: Quantitative Reasoning on Encrypted Security SLAs; https://arxiv.org/abs/1804.04426

 

2017

  1. S. Albaghdady, S. Winter, A. Taha, H. Zhang, N. Suri. C’MON: Monitoring the Compliance of Cloud Services to Contracted Properties; Proc. of 12th International Conference on Availability, Reliability and Security (ARES) – acceptance rate: 24%

  2. A. Taha, S. Manzoor, N. Suri. SLA-based Service Selection for Multi-Cloud Environments; Proc. of 1st IEEE International Conference on EDGE Computing (EGDE)

  3. J. Luna, A. Taha, R. Trapero, N. Suri. Quantitative Reasoning about Cloud Security Using Service Level Agreements; In IEEE Transaction on Cloud Computing (TCC) – impact factor: 5.967

  4. A. Taha, R. Trapero, J. Luna, N. Suri. A Framework for Ranking Cloud Security Services; Proc. of 14th IEEE International Conference on Services Computing (SCC) 

  5. R. Trapero, J. Modic, M. Stopar, A. Taha, N. Suri. A Novel Approach to Manage Cloud Security SLA Incidents; In Future Generation Computer System – impact factor: 5.768

  6. J. Modic, R. Trapero, A. Taha, J. Luna, M. Stopar, N. Suri. Novel Efficient Techniques for Real-Time Cloud Security Assessment; In Elsevier Journal on Computers & Security – impact factor: 3.062

 

2016

  1. A. Taha, P. Metzler, R. Trapero, J. Luna, N. Suri. Identifying and Utilizing Dependencies Across Cloud Security Services; Proc. of 11th ACM on Asia Conference on Computer and Communications (ASIACCS) – acceptance rate: 20.8%

  2. H. Zhang, A. Taha, R. Trapero, J. Luna, N. Suri. Sentry: A novel approach for mitigating application layer DDoS security; Proc. of 15th IEEE conference on trust, security and privacy in computing and communications (Trustcom) – acceptance rate: 28.4%

  3. S. Manzoor, A. Taha, N. Suri.Trust Validation of Cloud IaaS: A Customer Centric Approach; Proc. of 15th IEEE conference on trust, security and privacy in computing and communications (Trustcom) – acceptance rate: 28.4%

 

2014

  1. A. Taha, R. Trapero, J. Luna, N. Suri. AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. Proc. of IEEE 13th international conference on trust, security and privacy in computing and communications (Trustcom) – acceptance rate: 31.7%

 

2013

  1. (Alphabetical order:) C. Busold, A. Dmitrienko, A. Sadeghi, H. Seudi, M. Sobhani, A. Taha, C. Wachsmann. Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer. Proc. of 3rd ACM conference on Data and application security and privacy (CODASPY) – acceptance rate: 23.1%

Sponsored Projects

bottom of page