Ruben Trapero Burgos
Cited by
Cited by
Security management architecture for NFV/SDN-aware IoT systems
AM Zarca, JB Bernabe, R Trapero, D Rivera, J Villalobos, A Skarmeta, ...
IEEE Internet of Things Journal 6 (5), 8005-8020, 2019
Method for selectively distributing information in a computer or communication network, and physical entities therefor
MAM Llorente, JMDÁ Ramiro, BSM González, RT Burgos, JCY García
US Patent App. 13/809,503, 2013
Quantitative reasoning about cloud security using service level agreements
J Luna, A Taha, R Trapero, N Suri
IEEE Transactions on Cloud Computing 5 (3), 457-471, 2015
AHP-based quantitative approach for assessing and comparing cloud security
A Taha, R Trapero, J Luna, N Suri
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
A user-centric service creation approach for Next Generation Networks
JC Yelmo, JM Del Alamo, R Trapero, P Falcarm, J Yi, B Cairo, C Baladrón
Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First …, 2008
Novel efficient techniques for real-time cloud security assessment
J Modic, R Trapero, A Taha, J Luna, M Stopar, N Suri
Computers & Security 62, 1-18, 2016
A novel approach to manage cloud security SLA incidents
R Trapero, J Modic, M Stopar, A Taha, N Suri
Future Generation Computer Systems 72, 193-205, 2017
A user-centric approach to service creation and delivery over next generation networks
JC Yelmo, JM del Alamo, R Trapero, YS Martin
Computer Communications 34 (2), 209-222, 2011
User-driven service lifecycle management–Adopting internet paradigms in telecom services
J Yelmo, R Trapero, J del Álamo, J Sienel, M Drewniok, I Ordás, ...
Service-Oriented Computing–ICSOC 2007, 342-352, 2007
Privacy and security threats on the Internet of Things
S Ziegler, C Crettaz, E Kim, A Skarmeta, JB Bernabe, R Trapero, ...
Internet of things security and data protection, 9-43, 2019
At your service: service-oriented computing from an EU perspective
E Di Nitto
MIT press, 2009
Blended identity: Pervasive idm for continuous authentication
P Arias-Cabarcos, F Almenarez, R Trapero, D Diaz-Sanchez, A Marin
IEEE Security & Privacy 13 (3), 32-39, 2015
Security considerations in 5G networks: A slice-aware trust zone approach
D Schinianakis, R Trapero, DS Michalopoulos, BGN Crespo
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-8, 2019
Identifying and utilizing dependencies across cloud security services
A Taha, P Metzler, R Trapero, J Luna, N Suri
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Quantifiably trusting the cloud: putting metrics to work
R Trapero, J Luna, N Suri
IEEE Security & Privacy 14 (3), 73-77, 2016
Threat modeling the cloud: an ontology based approach
S Manzoor, T Vateva-Gurova, R Trapero, N Suri
Information and Operational Technology Security Systems: First International …, 2019
Assessing privacy capabilities of cloud service providers
JM Del Alamo, R Trapero, YS Martin, JC Yelmo, N Suri
IEEE Latin America Transactions 13 (11), 3634-3641, 2015
A privacy-considerate framework for identity management in mobile services
JM Del Álamo, AM Fernández, R Trapero, JC Yelmo, MA Monjas
Mobile Networks and Applications 16, 446-459, 2011
Identity management and web services as service ecosystem drivers in converged networks
JC Yelmo, R Trapero, JM Del Alamo
IEEE Communications Magazine 47 (3), 174-180, 2009
Self-service privacy: user-centric privacy for network-centric identity
J del Alamo, M Monjas, J Yelmo, B Miguel, R Trapero, A Fernandez
Trust Management IV, 17-31, 2010
The system can't perform the operation now. Try again later.
Articles 1–20