Security management architecture for NFV/SDN-aware IoT systems AM Zarca, JB Bernabe, R Trapero, D Rivera, J Villalobos, A Skarmeta, ... IEEE Internet of Things Journal 6 (5), 8005-8020, 2019 | 123 | 2019 |
Method for selectively distributing information in a computer or communication network, and physical entities therefor MAM Llorente, JMDÁ Ramiro, BSM González, RT Burgos, JCY García US Patent App. 13/809,503, 2013 | 122 | 2013 |
Quantitative reasoning about cloud security using service level agreements J Luna, A Taha, R Trapero, N Suri IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015 | 91 | 2015 |
AHP-based quantitative approach for assessing and comparing cloud security A Taha, R Trapero, J Luna, N Suri 2014 IEEE 13th international conference on trust, security and privacy in …, 2014 | 65 | 2014 |
A user-centric service creation approach for Next Generation Networks JC Yelmo, JM Del Alamo, R Trapero, P Falcarm, J Yi, B Cairo, C Baladrón Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First …, 2008 | 43 | 2008 |
A novel approach to manage cloud security SLA incidents R Trapero, J Modic, M Stopar, A Taha, N Suri Future Generation Computer Systems 72, 193-205, 2017 | 38 | 2017 |
Novel efficient techniques for real-time cloud security assessment J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri Computers & Security 62, 1-18, 2016 | 36 | 2016 |
A user-centric approach to service creation and delivery over next generation networks JC Yelmo, JM del Alamo, R Trapero, YS Martin Computer Communications 34 (2), 209-222, 2011 | 32 | 2011 |
User-driven service lifecycle management–Adopting internet paradigms in telecom services J Yelmo, R Trapero, J del Álamo, J Sienel, M Drewniok, I Ordás, ... Service-Oriented Computing–ICSOC 2007, 342-352, 2007 | 30 | 2007 |
Privacy and security threats on the Internet of Things S Ziegler, C Crettaz, E Kim, A Skarmeta, JB Bernabe, R Trapero, ... Internet of things security and data protection, 9-43, 2019 | 22 | 2019 |
At your service: service-oriented computing from an EU perspective E Di Nitto MIT press, 2009 | 22 | 2009 |
Blended identity: Pervasive IdM for continuous authentication P Arias-Cabarcos, F Almenarez, R Trapero, D Diaz-Sanchez, A Marin IEEE Security & Privacy 13 (3), 32-39, 2015 | 20 | 2015 |
Security considerations in 5G networks: A slice-aware trust zone approach D Schinianakis, R Trapero, DS Michalopoulos, BGN Crespo 2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-8, 2019 | 19 | 2019 |
Threat modeling the cloud: An ontology based approach S Manzoor, T Vateva-Gurova, R Trapero, N Suri Information and Operational Technology Security Systems: First International …, 2019 | 18 | 2019 |
Identifying and utilizing dependencies across cloud security services A Taha, P Metzler, R Trapero, J Luna, N Suri Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 15 | 2016 |
Quantifiably trusting the cloud: putting metrics to work R Trapero, J Luna, N Suri IEEE Security & Privacy 14 (3), 73-77, 2016 | 14 | 2016 |
Assessing privacy capabilities of cloud service providers JM Del Alamo, R Trapero, YS Martin, JC Yelmo, N Suri IEEE Latin America Transactions 13 (11), 3634-3641, 2015 | 14 | 2015 |
A privacy-considerate framework for identity management in mobile services JM Del Álamo, AM Fernández, R Trapero, JC Yelmo, MA Monjas Mobile Networks and Applications 16, 446-459, 2011 | 14 | 2011 |
Self-service privacy: user-centric privacy for network-centric identity J del Alamo, M Monjas, J Yelmo, B Miguel, R Trapero, A Fernandez Trust Management IV, 17-31, 2010 | 11 | 2010 |
Identity management and web services as service ecosystem drivers in converged networks JC Yelmo, R Trapero, JM Del Alamo IEEE Communications Magazine 47 (3), 174-180, 2009 | 11 | 2009 |