All Stories

  1. GDPR compliance through standard security controls: An automated approach
  2. Automated threat modelling and risk analysis in e-Government using BPMN
  3. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  4. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  5. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  6. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  7. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  8. Risk Analysis Automation Process in IT Security for Cloud Applications
  9. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  10. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  11. A Conceptual Model for the General Data Protection Regulation
  12. Threat Modeling of Edge-Based IoT Applications
  13. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  14. A cloud-edge smart infrastructures for road safety
  15. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  16. A methodology for automated penetration testing of cloud applications
  17. Discovery of DoS attacks by the ZED-IDS anomaly detector
  18. Toward the automation of threat modeling and risk assessment in IoT systems
  19. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  20. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  21. WETICE 2019 - General Track
  22. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  23. Model-based deployment of secure multi-cloud applications
  24. Automated Risk Analysis for IoT Systems
  25. Internet of things reference architectures, security and interoperability: A survey
  26. Security-by-design in multi-cloud applications: An optimization approach
  27. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  28. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  29. Per-service security SLAs for cloud security management: model and implementation
  30. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  31. Dynamic security assurance in multi-cloud DevOps
  32. Automatically Enforcing Security SLAs in the Cloud
  33. A Security Metric Catalogue for Cloud Applications
  34. MUSA Deployer: Deployment of Multi-cloud Applications
  35. Malware Detection for Secure Microgrids: CoSSMic Case Study
  36. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  37. Secure microGRID in Cloud: The CoSSMic Case Study
  38. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  39. An Automatic Tool for Benchmark Testing of Cloud Applications
  40. SLAs for cloud applications: agreement protocol and REST-based implementation
  41. Security SLA in Next Generation Data Centers, the SPECS Approach
  42. Security SLAs for Cloud Services: Hadoop Case Study
  43. SLA-based Secure Cloud Application Development
  44. Cloud Security: From Per-Provider to Per-Service Security SLAs
  45. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  46. Per-Service Security SLa: A New Model for Security Management in Clouds
  47. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  48. A framework for cloud-aware development of bag-of-tasks scientific applications
  49. Cloud Challenges towards Free Flow of Data
  50. Methodology to Obtain the Security Controls in Multi-cloud Applications
  51. On the Next Generations of Infrastructure-as-a-Services
  52. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  53. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  54. Towards a Proof-based SLA Management Framework
  55. DoS Protection in the Cloud through the SPECS Services
  56. Economic Denial of Sustainability Mitigation in Cloud Computing
  57. Early Prediction of the Cost of Cloud Usage for HPC Applications
  58. SLA-Based Secure Cloud Application Development: The SPECS Framework
  59. Security Monitoring in the Cloud: An SLA-Based Approach
  60. REST-Based SLA Management for Cloud Applications
  61. Cloud Evaluation: Benchmarking and Monitoring
  62. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  63. Performance prediction of cloud applications through benchmarking and simulation
  64. Stealthy Denial of Service Strategy in Cloud Computing
  65. On the Adoption of Security SLAs in the Cloud
  66. Early Prediction of the Cost of HPC Application Execution in the Cloud
  67. A Portable Tool for Running MPI Applications in the Cloud
  68. Cloud-Aware Development of Scientific Applications
  69. Developing Secure Cloud Applications
  70. An SLA-based brokering platform to provide sensor networks as-a-service
  71. SecLA-Based Negotiation and Brokering of Cloud Resources
  72. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  73. Security as a Service Using an SLA-Based Approach via SPECS
  74. Developing Secure Cloud Applications: A Case Study
  75. Cost/Performance Evaluation for Cloud Applications Using Simulation
  76. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  77. Planting parallel program simulation on the cloud
  78. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  79. Concurrent simulation in the cloud with the mJADES framework
  80. Experiences in building a mOSAIC of clouds
  81. The CloudGrid approach: Security analysis and performance evaluation
  82. SLA-Oriented Security Provisioning for Cloud Computing
  83. Simulation-Based Performance Evaluation of Cloud Applications
  84. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  85. Ontology-based Negotiation of security requirements in cloud
  86. [Front matter]
  87. An SLA-based Broker for Cloud Infrastructures
  88. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  89. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  90. mJADES: Concurrent Simulation in the Cloud
  91. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  92. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  93. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  95. User Centric Service Level Management in mOSAIC Applications
  96. A SLA-based interface for security management in cloud and GRID integrations
  97. Cloud Application Monitoring: The mOSAIC Approach
  98. QoS Management in Cloud@Home Infrastructures
  99. Building an interoperability API for Sky computing
  100. CHASE: An Autonomic Service Engine for Cloud Environments
  101. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  102. Performance Prediction for HPC on Clouds
  103. Cloud@Home: Performance Management Components
  104. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  105. A Cloud Agency for SLA Negotiation and Management
  106. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  107. Architecturing a Sky Computing Platform
  108. Security and Performance Trade-off in PerfCloud
  109. Identity federation in cloud computing
  110. Autonomic Composite-service Architecture with MAWeS
  111. Cloud Agency: A Mobile Agent Based Cloud System
  112. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  113. An interoperability system for authentication and authorisation in VANETs
  114. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  115. A Service for Virtual Cluster Performance Evaluation
  116. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  117. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  118. Self-optimization of secure web services
  119. Simulation-based optimization of multiple-task GRID applications
  120. Message from General Chair(s)
  121. A Framework for Mobile Agent Platform performance Evaluation
  122. Cluster systems and simulation: from benchmarking to off-line performance prediction
  123. Optimizing secure Web Services with MAWeS: A case study
  124. Static evaluation of Certificate Policies for GRID PKIs interoperability
  125. Autonomic Web service development with MAWeS
  126. Performance Oriented Development and Tuning of GRID Applications
  127. Self-optimization of MPI Applications Within an Autonomic Framework
  128. Performance prediction through simulation of a hybrid MPI/OpenMP application
  129. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  130. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  131. Self-optimizing MPI Applications: A Simulation-Based Approach
  132. Performance simulation of a hybrid openMP/MPI application with HeSSE
  133. Security level evaluation: policy and fuzzy techniques
  134. A Performance-Oriented Technique for Hybrid Application Development
  135. Performance modeling of scientific applications: scalability analysis of LAPW0
  136. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  137. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  138. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  139. Access Control in Federated Clouds
  140. Access Control in Federated Clouds
  141. Security Issues in Cloud Federations
  142. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  143. A Simulation-Based Framework for Autonomic Web Services
  144. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  145. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  146. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  147. Mobile Agents Self-optimization with MAWeS
  148. A SLA evaluation methodology in Service Oriented Architectures