Author of the publication

Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud.

, , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-level specification of a middleware framework for mobile ad hoc networks: spontaneousware case., and . SAC, page 221-222. ACM, (2009)Incorporating Security Requirements into Service Composition: From Modelling to Execution., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 373-388. (2009)Comparative Study of Service-Based Security-Aware Business Processes Automation Tools., , , , and . SMC, page 1413-1418. IEEE, (2013)Towards Government as a Social Machine., , , , , and . WWW (Companion Volume), page 1131-1136. ACM, (2015)An Integrated Approach for Model Driven Process Modeling and Enactment., , , and . SBES, page 104-114. IEEE Computer Society, (2009)Formalising Middleware Systems: A Design Pattern-Based Approach.. COMPSAC, page 658-667. IEEE Computer Society, (2013)A reconfigurable group management middleware service for wireless sensor networks., and . MPAC, volume 115 of ACM International Conference Proceeding Series, page 1-8. ACM, (2005)ASTRO: A tool for dependability evaluation of Data Center infrastructures., , , , , , , , , and 2 other author(s). SMC, page 783-790. IEEE, (2010)AMALGHMA -An environment for measuring execution time and energy consumption in embedded systems., , , , , , and . SMC, page 3364-3369. IEEE, (2014)An Approach for Reducing the Gap between BPMN Models and Implementation Artifacts., , , , , , , , , and 1 other author(s). RITA, 16 (2): 83-86 (2009)