Author of the publication

Relating Security Requirements and Design Patterns: Reducing Security Requirements Implementation Impacts with Design Patterns.

, , and . ICSEA, page 9-14. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A File Recommendation Model For Cloud Storage Systems., , , , , and . SBSI, page 111-118. ACM, (2015)Measuring Distributed Applications through MapReduce and Traffic Analysis., , , , and . ICPADS, page 704-705. IEEE Computer Society, (2012)Towards a taxonomy for security threats on the web ecosystem., , , , , , , , , and . NOMS, page 584-590. IEEE, (2016)Security Quality Assurance on Web-Based Application through Security Requirements Tests: Elaboration, Execution and Automation., , , , and . ICSEA, page 272-277. IEEE Computer Society, (2010)An Availability Algorithm for Backup Systems Using Secure P2P Platform., , , , and . ICSEA, page 477-481. IEEE Computer Society, (2010)Monext: An Accounting Framework for Infrastructure Clouds., , , , and . ISPDC, page 26-33. IEEE, (2013)A cloud-based recommendation model., , , , , and . EATIS, page 23:1-23:4. ACM, (2014)Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers., , , and . JISIC, page 1-8. IEEE, (2014)A service-oriented architecture for billing resources in IaaS cloud platforms., , , , , and . SAC, page 1719-1721. ACM, (2015)Analysis of Prediction and Replacement Algorithms Applied to Real Workload for Storage Devices., , , , , , and . MASCOTS, page 507-509. IEEE Computer Society, (2012)