Author of the publication

Tools for Ensemble Design and Runtime.

, , , , , , , , , and 5 other author(s). The ASCENS Approach, volume 8998 of Lecture Notes in Computer Science, Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralised provenance for healthcare data., , , , and . Int. J. Medical Informatics, (2020)PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain., , , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies., , , and . IEEE Trans. Software Eng., 45 (1): 2-33 (2019)Differentially Private Data Sharing in a Cloud Federation with Blockchain., , , and . IEEE Cloud Comput., 5 (6): 69-79 (2018)Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case., , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Riskio: A Serious Game for Cyber Security Awareness and Education., , , and . Comput. Secur., (2020)A Formal Approach to Specification, Analysis and Implementation of Policy-Based Systems.. University of Pisa, Italy, (2016)Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - - A Practical Approach -., , , and . WS-FM, volume 8379 of Lecture Notes in Computer Science, page 85-105. Springer, (2013)On Programming and Policing Autonomic Computing Systems., , , and . ISoLA (1), volume 8802 of Lecture Notes in Computer Science, page 164-183. Springer, (2014)Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments., , , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 146-155. CEUR-WS.org, (2017)