U
Umberto Villano
Researcher at University of Sannio
Publications - 161
Citations - 1681
Umberto Villano is an academic researcher from University of Sannio. The author has contributed to research in topics: Cloud computing & Cloud computing security. The author has an hindex of 20, co-authored 153 publications receiving 1499 citations. Previous affiliations of Umberto Villano include Ohio State University & University of Naples Federico II.
Papers
More filters
Journal ArticleDOI
Analyzing cloning evolution in the Linux kernel
TL;DR: The hypothesis that the Linux system does not contain a relevant fraction of code duplication is supported, suggesting a fairly stable structure, evolving smoothly without any evidence of degradation.
Journal ArticleDOI
An SLA-based Broker for Cloud Infrastructures
Antonio Cuomo,Giuseppe Di Modica,Salvatore Distefano,Antonio Puliafito,Massimiliano Rak,Orazio Tomarchio,Salvatore Venticinque,Umberto Villano +7 more
TL;DR: This paper presents and discusses the first step towards Cloud@Home: providing quality of service and service level agreement facilities on top of unreliable, intermittent Cloud providers.
Proceedings ArticleDOI
Security as a Service Using an SLA-Based Approach via SPECS
TL;DR: This paper introduces a new approach, named SPECS, which aims to offer mechanisms to specify cloud security requirements and to assess the security features offered by CSPs, and to integrate the desired security services into cloud services with a Security-as-a-Service approach.
Journal ArticleDOI
Toward the automation of threat modeling and risk assessment in IoT systems
TL;DR: This work proposes an approach aimed at supporting the security analysis of an IoT system by means of an almost completely automated process for threat modeling and risk assessment, which also helps identify the security controls to implement in order to mitigate existing security risks.
Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages
TL;DR: This paper proposes an approach for detecting clones in web sites and web applications, obtained tailoring the existing methods to detect clones in traditional software systems.