Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying fault tolerant web service compositions., and . Comput. Syst. Sci. Eng., (2008)EDCC 2012 - Fast Abstracts & Student Forum Proceedings, and . CoRR, (2012)An Experimental Study of Software Aging and Rejuvenation in Dockerd., and . EDCC, page 1-6. IEEE, (2019)Penetration Testing for Web Services., and . Computer, 47 (2): 30-36 (2014)NoSQL Databases: A Software Engineering Perspective., , , , and . WorldCIST (1), volume 353 of Advances in Intelligent Systems and Computing, page 741-750. Springer, (2015)Benchmarking Untrustworthiness: An Alternative to Security Measurement., and . Int. J. Dependable Trust. Inf. Syst., 1 (2): 32-54 (2010)Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective., , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 404-416. Springer, (2012)Detecting Malicious SQL., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 259-268. Springer, (2007)Editorial: Security and Dependability of Cloud Systems and Services - Part II., and . IEEE Trans. Serv. Comput., 10 (6): 927-928 (2017)Towards fault tolerance in web services compositions., and . EFTS, page 2. ACM, (2007)