School of Computing

Publications by Prof Theodosios Dimitrakos

Also view these in the Kent Academic Repository

Article
Daniel, J. et al. (2015). Integrating Security Services in Cloud Service Stores. Trust Management IX. IFIP Advances in Information and Communication Technology [Online] 454:226-239. Available at: http://doi.org/10.1007/978-3-319-18491-3_19.
Sajjad, A. et al. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Generation Computer Systems [Online] 48:19-27. Available at: http://dx.doi.org/10.1016/j.future.2015.01.018.
Ferrer, A. et al. (2012). OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems [Online] 28:66-77. Available at: http://dx.doi.org/10.1016/j.future.2011.05.022.
Basu, A. et al. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications [Online] 1:8. Available at: http://dx.doi.org/10.1186/2192-113X-1-8.
Book section
Daniel, J. et al. (2015). Integrating Security Services in Cloud Service Stores. in: Trust Management IX. Springer International Publishing, pp. 226-239. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3_19.
Pawar, P. et al. (2015). Security-as-a-Service in Multi-cloud and Federated Cloud Environments. in: Trust Management IX. Hamburg, Germany: Springer International Publishing, pp. 251-261. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3_21.
Pawar, P. et al. (2015). Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. in: Trust Management IX. Springer International Publishing, pp. 251-261. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3.
Conference or workshop item
Shackleton, M. et al. (2016). Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper). in: Debruyne, C. et al. eds. 2016 OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer, pp. 883-889. Available at: http://dx.doi.org/10.1007/978-3-319-48472-3_55.
Ardagna, C. et al. (2016). A Certification Technique for Cloud Security Adaptation. in: IEEE International Conference on Services Computing, SCC 2016. San Francisco, USA: IEEE, pp. 324-331. Available at: http://dx.doi.org/10.1109/SCC.2016.49.
Daniel, J. et al. (2015). Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. in: pp. 1021-1026. Available at: http://doi.org/10.1109/CloudCom.2014.92.
Vu, Q. et al. (2015). Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. in: IEEE Conference on Communications and Network Security (CNS). pp. 638-642. Available at: http://dx.doi.org/10.1109/CNS.2015.7346879.
Dimitrakos, T. (2015). Foreword: Towards Trusted Cloud Ecosystems. in: IFIP International Conference on Trust Management. Springer, pp. 215-216. Available at: http://doi.org/10.1007/978-3-319-18491-3_17.
Gouvas, P. et al. (2015). A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project. in: 9th IFIP WG 11.11 International Conference, IFIPTM 2015. Springer, pp. 217-225. Available at: http://doi.org/10.1007/978-3-319-18491-3_18.
Dimitrakos, T. (2014). Context-Aware Multifactor Authentication Based on Dynamic Pin. in: IFIP SEC 2015. Springer, pp. 330-338. Available at: http://dx.doi.org/10.1007/978-3-642-55415-5_27.
Pawar, P. et al. (2014). Trust Assessment Using Cloud Broker. in: IFIP International Conference on Trust Management. pp. 237-244. Available at: http://doi.org/10.1007/978-3-662-43813-8_18.
Ye, B. et al. (2014). Mirroring Mobile Phone in the Clouds. in: Mobile Services (MS), 2014 IEEE International Conference on. pp. 140-146. Available at: http://dx.doi.org/10.1109/MobServ.2014.28.
Wang, F. et al. (2014). CloudJet4BigData: Streamlining Big Data via an accelerated socket interface. in: IEEE Big Data. IEEE. Available at: http://dx.doi.org/10.1109/BigData.Congress.2014.93.
de Leusse, P. et al. (2009). Self Managed Security Cell, a Security Model for the Internet of Things and Services. in: Advances in Future Internet, 2009 First International Conference on. IEEE Xplore, pp. 47-52. Available at: http://dx.doi.org/10.1109/AFIN.2009.15.
Edited book
Damsgaard Jensen, C. et al. (2015). Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. [Online]. Damsgaard Jensen, C. et al. eds. Springer. Available at: http://doi.org/10.1007/978-3-319-18491-3.
Dimitrakos, T. (2010). Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise: A selection of common capabilities validated in real-life business trials by the BEinGRID consortium. [Online]. Dimitrakos, T., Martrat, J. and Wesner, S. eds. Springer Berlin Heidelberg. Available at: http://dx.doi.org/10.1007/978-3-642-04086-3.
Total publications in KAR: 20 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 15/12/2017