Massimiliano Rak
Seconda Universita degli Studi di Napoli
Italy
My co-authors include
Marta Catillo
Dr. Juan Manuel Corchado
Salvatore Distefano
My Publications
ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT ...
August 2022
ESSecA: An automated expert system for threat modelling and penetration testing for IoT...
Computers & Electrical Engineering
April 2022
Security and Privacy Service Level Agreement composition for Internet of Things systems...
Computers & Electrical Engineering
March 2022
Automated Threat Modeling Approaches: Comparison of Open Source Tools
January 2022
Risk Analysis Automation Process in IT Security for Cloud Applications
January 2022
Demystifying the role of public intrusion datasets: A replication study of DoS network ...
Computers & Security
September 2021
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
July 2021
A Conceptual Model for the General Data Protection Regulation
January 2021
Threat Modeling of Edge-Based IoT Applications
January 2021
Design and Development of a Technique for the Automation of the Risk Analysis Process i...
January 2021
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a ...
Journal of Systems and Software
May 2020
A methodology for automated penetration testing of cloud applications
International Journal of Grid and Utility Computing
January 2020
Discovery of DoS attacks by the ZED-IDS anomaly detector
Journal of High Speed Networks
November 2019
Toward the automation of threat modeling and risk assessment in IoT systems
Internet of Things
September 2019
Optimization and Validation of eGovernment Business Processes with Support of Semantic ...
June 2019
Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
June 2019
WETICE 2019 - General Track
June 2019
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-ba...
IET Software
February 2019
Model-based deployment of secure multi-cloud applications
International Journal of Grid and Utility Computing
January 2019
Automated Risk Analysis for IoT Systems
October 2018
Internet of things reference architectures, security and interoperability: A survey
Internet of Things
September 2018
Security-by-design in multi-cloud applications: An optimization approach
Information Sciences
July 2018
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
June 2018
A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
January 2018
Per-service security SLAs for cloud security management: model and implementation
International Journal of Grid and Utility Computing
January 2018
Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
December 2017
Dynamic security assurance in multi-cloud DevOps
October 2017
Automatically Enforcing Security SLAs in the Cloud
IEEE Transactions on Services Computing
September 2017
A Security Metric Catalogue for Cloud Applications
July 2017
MUSA Deployer: Deployment of Multi-cloud Applications
June 2017
Malware Detection for Secure Microgrids: CoSSMic Case Study
June 2017
Local and interregional alpha EEG dynamics dissociate between memory for search and mem...
NeuroImage
April 2017
Secure microGRID in Cloud: The CoSSMic Case Study
January 2017
Security Assurance of (Multi-)Cloud Application with Security SLA Composition
January 2017
An Automatic Tool for Benchmark Testing of Cloud Applications
January 2017
SLAs for cloud applications: agreement protocol and REST-based implementation
International Journal of Grid and Utility Computing
January 2017
Security SLA in Next Generation Data Centers, the SPECS Approach
January 2017
Security SLAs for Cloud Services: Hadoop Case Study
January 2017
SLA-based Secure Cloud Application Development
Scalable Computing Practice and Experience
October 2016
Cloud Security: From Per-Provider to Per-Service Security SLAs
September 2016
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
July 2016
Per-Service Security SLa: A New Model for Security Management in Clouds
June 2016
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
June 2016
A framework for cloud-aware development of bag-of-tasks scientific applications
International Journal of Grid and Utility Computing
January 2016
Cloud Challenges towards Free Flow of Data
Procedia Computer Science
January 2016
Methodology to Obtain the Security Controls in Multi-cloud Applications
January 2016
On the Next Generations of Infrastructure-as-a-Services
January 2016
Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
January 2016
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud A...
Procedia Computer Science
January 2016
Towards a Proof-based SLA Management Framework
January 2016
DoS Protection in the Cloud through the SPECS Services
November 2015
Economic Denial of Sustainability Mitigation in Cloud Computing
October 2015
Early Prediction of the Cost of Cloud Usage for HPC Applications
Scalable Computing Practice and Experience
September 2015
SLA-Based Secure Cloud Application Development: The SPECS Framework
September 2015
Security Monitoring in the Cloud: An SLA-Based Approach
August 2015
REST-Based SLA Management for Cloud Applications
June 2015
Cloud Evaluation: Benchmarking and Monitoring
April 2015
Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
RSC Advances
January 2015
Performance prediction of cloud applications through benchmarking and simulation
International Journal of Computational Science and Engineering
January 2015
Stealthy Denial of Service Strategy in Cloud Computing
IEEE Transactions on Cloud Computing
January 2015
On the Adoption of Security SLAs in the Cloud
January 2015
Early Prediction of the Cost of HPC Application Execution in the Cloud
September 2014
A Portable Tool for Running MPI Applications in the Cloud
September 2014
Cloud-Aware Development of Scientific Applications
June 2014
Developing Secure Cloud Applications
Scalable Computing Practice and Experience
April 2014
An SLA-based brokering platform to provide sensor networks as-a-service
International Journal of Business Process Integration and Management
January 2014
SecLA-Based Negotiation and Brokering of Cloud Resources
January 2014
An SLA-Based Approach to Manage Sensor Networks as-a-Service
December 2013
Security as a Service Using an SLA-Based Approach via SPECS
December 2013
Developing Secure Cloud Applications: A Case Study
September 2013
Cost/Performance Evaluation for Cloud Applications Using Simulation
June 2013
The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
Scalable Computing Practice and Experience
April 2013
Planting parallel program simulation on the cloud
Concurrency and Computation Practice and Experience
March 2013
A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
March 2013
Concurrent simulation in the cloud with the mJADES framework
International Journal of Simulation and Process Modelling
January 2013
Experiences in building a mOSAIC of clouds
Journal of Cloud Computing Advances Systems and Applications
January 2013
The CloudGrid approach: Security analysis and performance evaluation
Future Generation Computer Systems
January 2013
SLA-Oriented Security Provisioning for Cloud Computing
January 2013
Simulation-Based Performance Evaluation of Cloud Applications
January 2013
An intrusion detection framework for supporting SLA assessment in Cloud Computing
November 2012
Ontology-based Negotiation of security requirements in cloud
November 2012
[Front matter]
November 2012
An SLA-based Broker for Cloud Infrastructures
Journal of Grid Computing
October 2012
Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
September 2012
Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
July 2012
mJADES: Concurrent Simulation in the Cloud
July 2012
Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Prog...
June 2012
Intrusion Tolerance of Stealth DoS Attacks to Web Services
January 2012
Enhancing an Autonomic Cloud Architecture with Mobile Agents
January 2012
NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
January 2012
User Centric Service Level Management in mOSAIC Applications
January 2012
A SLA-based interface for security management in cloud and GRID integrations
December 2011
Cloud Application Monitoring: The mOSAIC Approach
November 2011
QoS Management in Cloud@Home Infrastructures
October 2011
Building an interoperability API for Sky computing
July 2011
CHASE: An Autonomic Service Engine for Cloud Environments
June 2011
Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
June 2011
Performance Prediction for HPC on Clouds
January 2011
Cloud@Home: Performance Management Components
January 2011
The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
January 2011
A Cloud Agency for SLA Negotiation and Management
January 2011
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
January 2011
Architecturing a Sky Computing Platform
January 2011
Security and Performance Trade-off in PerfCloud
January 2011
Identity federation in cloud computing
August 2010
Autonomic Composite-service Architecture with MAWeS
February 2010
Cloud Agency: A Mobile Agent Based Cloud System
February 2010
Instantaneous Load Dependent Servers (iLDS) Model for Web Services
February 2010
An interoperability system for authentication and authorisation in VANETs
International Journal of Autonomous and Adaptive Communications Systems
January 2010
Web Services Resilience Evaluation using LDS Load dependent Server Models.
Journal of Communications
January 2010
A Service for Virtual Cluster Performance Evaluation
January 2010
PerfCloud: Performance-Oriented Integration of Cloud and GRID
January 2010
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applic...
June 2009
Self-optimization of secure web services
Computer Communications
December 2008
Simulation-based optimization of multiple-task GRID applications
Future Generation Computer Systems
June 2008
Message from General Chair(s)
January 2008
A Framework for Mobile Agent Platform performance Evaluation
June 2007
Cluster systems and simulation: from benchmarking to off-line performance prediction
Concurrency and Computation Practice and Experience
January 2007
Optimizing secure Web Services with MAWeS: A case study
January 2007
Static evaluation of Certificate Policies for GRID PKIs interoperability
January 2007
Autonomic Web service development with MAWeS
January 2006
Performance Oriented Development and Tuning of GRID Applications
January 2006
Self-optimization of MPI Applications Within an Autonomic Framework
January 2006
Performance prediction through simulation of a hybrid MPI/OpenMP application
Parallel Computing
October 2005
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
January 2005
Security design and evaluation in a VoIP secure infrastracture: a policy based approach
January 2005
Self-optimizing MPI Applications: A Simulation-Based Approach
January 2005
Performance simulation of a hybrid openMP/MPI application with HeSSE
January 2004
Security level evaluation: policy and fuzzy techniques
January 2004
A Performance-Oriented Technique for Hybrid Application Development
January 2004
Performance modeling of scientific applications: scalability analysis of LAPW0
January 2003
Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
January 2003
MetaPL: A Notation System for Parallel Program Description and Performance Analysis
January 2001
The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The He...
January 2000
Access Control in Federated Clouds
Access Control in Federated Clouds
Security Issues in Cloud Federations
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
A Simulation-Based Framework for Autonomic Web Services
Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
Mobile Agents Self-optimization with MAWeS
A SLA evaluation methodology in Service Oriented Architectures