Author of the publication

Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems.

, , , and . TrustBus, volume 9830 of Lecture Notes in Computer Science, page 35-47. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach., , and . Domain-Specific Conceptual Modeling, Springer, (2016)Towards the Derivation of Secure Business Process Designs., , and . ER Workshops, volume 9382 of Lecture Notes in Computer Science, page 248-258. Springer, (2015)Supporting Secure Business Process Design via Security Process Patterns., , and . BPMDS/EMMSAD@CAiSE, volume 287 of Lecture Notes in Business Information Processing, page 19-33. Springer, (2017)Selecting a Cloud Service Provider in the age of cybercrime., and . Comput. Secur., (2013)Cyber-attack path discovery in a dynamic supply chain maritime risk management system., , and . Comput. Stand. Interfaces, (2018)Cyber Security Resilience in Business Informatics: An Exploratory Paper., , and . BIR, volume 398 of Lecture Notes in Business Information Processing, page 53-66. Springer, (2020)Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)., , and . EANN, volume 1000 of Communications in Computer and Information Science, page 476-487. Springer, (2019)Security-Aware Elasticity for NoSQL Databases., , , and . MEDI, volume 9344 of Lecture Notes in Computer Science, page 181-197. Springer, (2015)Apparatus: A framework for security analysis in internet of things systems., , , and . Ad Hoc Networks, (2019)An architectural description language for secure Multi-Agent Systems., , , and . Web Intell. Agent Syst., 8 (1): 99-122 (2010)