Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for cloud-aware development of bag-of-tasks scientific applications., , , and . Int. J. Grid Util. Comput., 7 (2): 130-140 (2016)A Security and Privacy Validation Methodology for e-Health Systems., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (2s): 67:1-67:22 (2021)Automatically Enforcing Security SLAs in the Cloud., , , , and . IEEE Trans. Serv. Comput., 10 (5): 741-755 (2017)SLAs for cloud applications: agreement protocol and REST-based implementation., , and . Int. J. Grid Util. Comput., 8 (2): 120-132 (2017)ISM-AC: an immune security model based on alert correlation and software-defined networking., , , , and . Int. J. Inf. Sec., 21 (2): 191-205 (2022)Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications., , , and . Cloud Forward, volume 97 of Procedia Computer Science, page 53-62. Elsevier, (2016)A Cloud SecDevOps Methodology: From Design to Testing., , , and . QUATIC, volume 1266 of Communications in Computer and Information Science, page 317-331. Springer, (2020)PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems., , , , and . WETICE, page 58-63. IEEE, (2019)REST-Based SLA Management for Cloud Applications., , , and . WETICE, page 93-98. IEEE Computer Society, (2015)Analysis and Comparison of Security Protocols in Wireless Sensor Networks., , , and . SRDS Workshops, page 52-56. IEEE Computer Society, (2011)