School of Computing

Publications by Prof Theodosios Dimitrakos

Also view these in the Kent Academic Repository

Article
Sajjad, A. et al. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Generation Computer Systems [Online] 48:19-27. Available at: http://dx.doi.org/10.1016/j.future.2015.01.018.
Daniel, J. et al. (2015). Integrating Security Services in Cloud Service Stores. Trust Management IX. IFIP Advances in Information and Communication Technology [Online] 454:226-239. Available at: http://doi.org/10.1007/978-3-319-18491-3_19.
Ferrer, A. et al. (2012). OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems [Online] 28:66-77. Available at: http://dx.doi.org/10.1016/j.future.2011.05.022.
Basu, A. et al. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications [Online] 1:8. Available at: http://dx.doi.org/10.1186/2192-113X-1-8.
Book section
Pawar, P. et al. (2015). Security-as-a-Service in Multi-cloud and Federated Cloud Environments. in: Trust Management IX. Hamburg, Germany: Springer International Publishing, pp. 251-261. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3_21.
Pawar, P. et al. (2015). Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. in: Trust Management IX. Springer International Publishing, pp. 251-261. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3.
Daniel, J. et al. (2015). Integrating Security Services in Cloud Service Stores. in: Trust Management IX. Springer International Publishing, pp. 226-239. Available at: http://dx.doi.org/10.1007/978-3-319-18491-3_19.
Conference or workshop item
Shackleton, M. et al. (2016). Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper). in: Debruyne, C. et al. eds. 2016 OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer, pp. 883-889. Available at: http://dx.doi.org/10.1007/978-3-319-48472-3_55.
Ardagna, C. et al. (2016). A Certification Technique for Cloud Security Adaptation. in: IEEE International Conference on Services Computing, SCC 2016. San Francisco, USA: IEEE, pp. 324-331. Available at: http://dx.doi.org/10.1109/SCC.2016.49.
Daniel, J. et al. (2015). Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. in: pp. 1021-1026. Available at: http://doi.org/10.1109/CloudCom.2014.92.
Dimitrakos, T. (2015). Foreword: Towards Trusted Cloud Ecosystems. in: IFIP International Conference on Trust Management. Springer, pp. 215-216. Available at: http://doi.org/10.1007/978-3-319-18491-3_17.
Gouvas, P. et al. (2015). A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project. in: 9th IFIP WG 11.11 International Conference, IFIPTM 2015. Springer, pp. 217-225. Available at: http://doi.org/10.1007/978-3-319-18491-3_18.
Vu, Q. et al. (2015). Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. in: IEEE Conference on Communications and Network Security (CNS). pp. 638-642. Available at: http://dx.doi.org/10.1109/CNS.2015.7346879.
Ye, B. et al. (2014). Mirroring Mobile Phone in the Clouds. in: Mobile Services (MS), 2014 IEEE International Conference on. pp. 140-146. Available at: http://dx.doi.org/10.1109/MobServ.2014.28.
Dimitrakos, T. (2014). Context-Aware Multifactor Authentication Based on Dynamic Pin. in: IFIP SEC 2015. Springer, pp. 330-338. Available at: http://dx.doi.org/10.1007/978-3-642-55415-5_27.
Pawar, P. et al. (2014). Trust Assessment Using Cloud Broker. in: IFIP International Conference on Trust Management. pp. 237-244. Available at: http://doi.org/10.1007/978-3-662-43813-8_18.
Wang, F. et al. (2014). CloudJet4BigData: Streamlining Big Data via an accelerated socket interface. in: IEEE Big Data. IEEE. Available at: http://dx.doi.org/10.1109/BigData.Congress.2014.93.
de Leusse, P. et al. (2009). Self Managed Security Cell, a Security Model for the Internet of Things and Services. in: Advances in Future Internet, 2009 First International Conference on. IEEE Xplore, pp. 47-52. Available at: http://dx.doi.org/10.1109/AFIN.2009.15.
Edited book
Damsgaard Jensen, C. et al. (2015). Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. [Online]. Damsgaard Jensen, C. et al. eds. Springer. Available at: http://doi.org/10.1007/978-3-319-18491-3.
Dimitrakos, T. (2010). Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise: A selection of common capabilities validated in real-life business trials by the BEinGRID consortium. [Online]. Dimitrakos, T., Martrat, J. and Wesner, S. eds. Springer Berlin Heidelberg. Available at: http://dx.doi.org/10.1007/978-3-642-04086-3.
Total publications in KAR: 20 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 16/07/2018