Author of the publication

ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies.

, , and . J. Inf. Secur. Appl., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques., , and . SIN, page 136-143. ACM, (2013)Enforcing Data Geolocation Policies in Public Clouds using Trusted Computing., and . CoRR, (2023)Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance., , , , , , , , and . Sensors, 22 (23): 9338 (2022)Protecting Private Data in the Cloud., and . CLOSER, page 5-12. SciTePress, (2012)Trusted Launch of Virtual Machine Instances in Public IaaS Environments., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 309-323. Springer, (2012)EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme., , , and . IEEE Access, (2022)Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing., and . IACR Cryptol. ePrint Arch., (2023)A Color Image Enhancement Technique Using Multiscale Retinex., , , , and . FIT, page 119-124. IEEE Computer Society, (2013)Quantitative System-Level Security Verification of the IoV Infrastructure., , , , and . CoRR, (2021)A survey on privacy and access control schemes in fog computing., , , , , , , and . Int. J. Commun. Syst., (2021)