Author of the publication

Automation of service-based security-aware business processes in the Cloud.

, , , , and . Computing, 98 (9): 847-870 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Study of Service-Based Security-Aware Business Processes Automation Tools., , , , and . SMC, page 1413-1418. IEEE, (2013)Incorporating Security Requirements into Service Composition: From Modelling to Execution., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 373-388. (2009)Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud., , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)Predicting Service Composition Costs with Complex Cost Behavior., , and . SCC, page 419-426. IEEE Computer Society, (2015)Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 649-650. (2009)Automation of service-based security-aware business processes in the Cloud., , , , and . Computing, 98 (9): 847-870 (2016)COSTA: A cost-driven solution for migrating applications in multi-cloud environments., , and . SAC, page 57-63. ACM, (2023)Towards an approach to design and enforce security in web service composition., , , , , , , , , and 2 other author(s). Int. J. Web Eng. Technol., 7 (4): 323-357 (2012)A Methodology for Intelligent Offloading Decision in Mobile Cloud Computing Environments., , and . SMC, page 1571-1576. IEEE, (2021)SSC4Cloud Tooling: An Integrated Environment for the Development of Business Processes with Security Requirements in the Cloud., , , , , , , , , and . SERVICES, page 53-60. IEEE Computer Society, (2011)