Author of the publication

Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud.

, , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Model Generation for Cloud Infrastructure Planning., , , , , and . SMC, page 4098-4103. IEEE, (2013)A Strategy for Performance Evaluation and Modeling of Cloud Computing Services., , , and . RITA, 26 (1): 78-90 (2019)Execution Support to Long Running Workflows., , and . CIT, page 496-503. IEEE Computer Society, (2014)Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud., , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)An execution environment as a service for adaptive long-running workflows., , and . Int. J. Web Inf. Syst., 17 (2): 117-139 (2021)An Approach for Reducing the Gap between BPMN Models and Implementation Artifacts., , , , , , , , , and 1 other author(s). RITA, 16 (2): 83-86 (2009)Dependability evaluation of cloud infrastructures., , , , and . SMC, page 1282-1287. IEEE, (2014)Adaptive web service composition., , and . ACM SIGSOFT Softw. Eng. Notes, (2007)Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways., , , , , and . LADC, page 67-72. ACM, (2022)Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments., , and . AINA (2), volume 654 of Lecture Notes in Networks and Systems, page 1-13. Springer, (2023)