Auditing security compliance of the virtualized infrastructure in the cloud: Application to OpenStack

T Madi, S Majumdar, Y Wang, Y Jarraya… - Proceedings of the …, 2016 - dl.acm.org
Cloud service providers typically adopt the multi-tenancy model to optimize resources usage
and achieve the promised cost-effectiveness. Sharing resources between different tenants …

[HTML][HTML] Exact and approximate determination of the pareto front using minimal correction subsets

AP Guerreiro, J Cortes, D Vanderpooten… - Computers & Operations …, 2023 - Elsevier
Recently, it has been shown that the enumeration of Minimal Correction Subsets (MCS) of
Boolean formulas allows solving Multi-Objective Boolean Optimization (MOBO) formulations …

Security compliance auditing of identity and access management in the cloud: Application to OpenStack

S Majumdar, T Madi, Y Wang, Y Jarraya… - 2015 IEEE 7th …, 2015 - ieeexplore.ieee.org
Cloud computing has seen a lot of interests and adoption lately. Nonetheless, the
widespread adoption of cloud is still being hindered by the lack of transparency and …

User-level runtime security auditing for the cloud

S Majumdar, T Madi, Y Wang, Y Jarraya… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient,
and on-demand accesses to a shared pool of configurable computing resources. However …

Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack

S Majumdar, Y Jarraya, T Madi… - … –ESORICS 2016: 21st …, 2016 - Springer
The verification of security compliance with respect to security standards and policies is
desirable to both cloud providers and users. However, the sheer size of a cloud implies a …

ISOTOP: auditing virtual networks isolation across cloud layers in OpenStack

T Madi, Y Jarraya, A Alimohammadifar… - ACM Transactions on …, 2018 - dl.acm.org
Multi-tenancy in the cloud is a double-edged sword. While it enables cost-effective resource
sharing, it increases security risks for the hosted applications. Indeed, multiplexing virtual …

meSAT: multiple encodings of CSP to SAT

M Stojadinović, F Marić - Constraints, 2014 - Springer
One approach for solving Constraint Satisfaction Problems (CSP)(and related Constraint
Optimization Problems (COP)) involving integer and Boolean variables is reduction to …

Chip: A configurable hybrid parallel covering array constructor

H Mercan, C Yilmaz, K Kaya - IEEE Transactions on Software …, 2018 - ieeexplore.ieee.org
We present a configurable, hybrid, and parallel covering array constructor, called CHiP.
CHiP is parallel in that it utilizes vast amount of parallelism provided by graphics processing …

ProSAS: Proactive Security Auditing System for Clouds

S Majumdar, GS Chawla… - … on Dependable and …, 2021 - ieeexplore.ieee.org
The multi-tenancy in a cloud along with its dynamic and self-service nature could cause
severe security concerns, such as isolation breaches among cloud tenants. To mitigate such …

Detection of regions of interest and camouflage breaking by direct convexity estimation

A Tankus, Y Yeshurun - Proceedings 1998 IEEE workshop on …, 1998 - ieeexplore.ieee.org
Detection of regions of interest is usually based on edge maps. We suggest a novel
nonedge-based mechanism for detection of regions of interest, which extracts 3D …