On technical security issues in cloud computing M Jensen, J Schwenk, N Gruschka, LL Iacono 2009 IEEE international conference on cloud computing, 109-116, 2009 | 1121 | 2009 |
Attack surfaces: A taxonomy for attacks on cloud services N Gruschka, M Jensen 2010 IEEE 3rd international conference on cloud computing, 276-279, 2010 | 327 | 2010 |
All your clouds are belong to us: security analysis of cloud management interfaces J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ... Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011 | 242 | 2011 |
Security and privacy-enhancing multicloud architectures JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013 | 219 | 2013 |
A survey of attacks on web services: Classification and countermeasures M Jensen, N Gruschka, R Herkenhöner Computer Science-Research and Development 24, 185-197, 2009 | 199 | 2009 |
Privacy issues and data protection in big data: a case study analysis under GDPR N Gruschka, V Mavroeidis, K Vishi, M Jensen 2018 IEEE International Conference on Big Data (Big Data), 5027-5033, 2018 | 197 | 2018 |
Protection goals for privacy engineering M Hansen, M Jensen, M Rost 2015 IEEE security and privacy workshops, 159-166, 2015 | 183 | 2015 |
Soa and web services: New technologies, new standards-new attacks M Jensen, N Gruschka, R Herkenhoner, N Luttenberger Fifth European Conference on Web Services (ECOWS'07), 35-44, 2007 | 162 | 2007 |
On breaking {SAML}: Be whoever you want to be J Somorovsky, A Mayer, J Schwenk, M Kampmann, M Jensen 21st USENIX Security Symposium (USENIX Security 12), 397-412, 2012 | 151 | 2012 |
Challenges of privacy protection in big data analytics M Jensen 2013 IEEE International Congress on Big Data, 235-238, 2013 | 120 | 2013 |
Analysis of signature wrapping attacks and countermeasures S Gajek, M Jensen, L Liao, J Schwenk 2009 IEEE international conference on web services, 575-582, 2009 | 89 | 2009 |
Security prospects through cloud computing by adopting multiple clouds M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono 2011 IEEE 4th international conference on cloud computing, 565-572, 2011 | 87 | 2011 |
The impact of flooding attacks on network-based services M Jensen, N Gruschka, N Luttenberger 2008 Third International Conference on Availability, Reliability and …, 2008 | 67 | 2008 |
A security modeling approach for web-service-based business processes M Jensen, S Feja 2009 16th Annual IEEE International Conference and Workshop on the …, 2009 | 49 | 2009 |
Server-side streaming processing of ws-security N Gruschka, M Jensen, LL Iacono, N Luttenberger IEEE Transactions on Services Computing 4 (4), 272-285, 2011 | 48 | 2011 |
On the effectiveness of xml schema validation for countering xml signature wrapping attacks M Jensen, C Meyer, J Somorovsky, J Schwenk 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 7-13, 2011 | 47 | 2011 |
Towards an anonymous access control and accountability scheme for cloud computing M Jensen, S Schäge, J Schwenk 2010 IEEE 3rd International Conference on Cloud Computing, 540-541, 2010 | 43 | 2010 |
Crouching tiger-hidden payload: security risks of scalable vectors graphics M Heiderich, T Frosch, M Jensen, T Holz Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 39 | 2011 |
The accountability problem of flooding attacks in service-oriented architectures M Jensen, J Schwenk 2009 International Conference on Availability, Reliability and Security, 25-32, 2009 | 34 | 2009 |
Challenges in data science: a complex systems perspective A Carbone, M Jensen, AH Sato Chaos, Solitons & Fractals 90, 1-7, 2016 | 33 | 2016 |