Author of the publication

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.

, , , , , , , , and . Secure and Trustworthy Service Composition, volume 8900 of Lecture Notes in Computer Science, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of XACML policies with ASP., , and . NTMS, page 1-5. IEEE, (2015)MDD Approach for the Development of Context-Aware Applications., , and . CONTEXT, volume 4635 of Lecture Notes in Computer Science, page 15-28. Springer, (2007)FogProtect: Protecting Sensitive Data in the Computing Continuum., , , , , and . ESOCC Workshops, volume 1360 of Communications in Computer and Information Science, page 179-184. Springer, (2020)INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks., , , , , , , , , and 11 other author(s). ARES, page 105:1-105:10. ACM, (2020)Context-Aware Distributed Deployment of Component-Based Applications., , , and . OTM Workshops, volume 3292 of Lecture Notes in Computer Science, page 36-37. Springer, (2004)ETSI ZSM Driven Security Management in Future Networks., , , , , , , , and . FNWF, page 334-339. IEEE, (2022)Deployment of Component-based Applications on Top of a Context-aware Middleware., , , and . IASTED Conf. on Software Engineering, page 414-419. IASTED/ACTA Press, (2005)Dynamic adaptation of CORBA component-based applications., and . SAC, page 580-585. ACM, (2007)Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service., , , , , and . ARES, page 47:1-47:8. ACM, (2018)An Adaptation Methodology for the Deployment of Mobile Component-based Applications., , , and . ICPS, page 193-202. IEEE Computer Society, (2006)