All Stories

  1. Automated threat modelling and risk analysis in e-Government using BPMN
  2. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  3. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  4. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  5. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  6. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  7. Risk Analysis Automation Process in IT Security for Cloud Applications
  8. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  9. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  10. A Conceptual Model for the General Data Protection Regulation
  11. Threat Modeling of Edge-Based IoT Applications
  12. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  13. A cloud-edge smart infrastructures for road safety
  14. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  15. A methodology for automated penetration testing of cloud applications
  16. Discovery of DoS attacks by the ZED-IDS anomaly detector
  17. Toward the automation of threat modeling and risk assessment in IoT systems
  18. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  19. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  20. WETICE 2019 - General Track
  21. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  22. Model-based deployment of secure multi-cloud applications
  23. Automated Risk Analysis for IoT Systems
  24. Internet of things reference architectures, security and interoperability: A survey
  25. Security-by-design in multi-cloud applications: An optimization approach
  26. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  27. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  28. Per-service security SLAs for cloud security management: model and implementation
  29. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  30. Dynamic security assurance in multi-cloud DevOps
  31. Automatically Enforcing Security SLAs in the Cloud
  32. A Security Metric Catalogue for Cloud Applications
  33. MUSA Deployer: Deployment of Multi-cloud Applications
  34. Malware Detection for Secure Microgrids: CoSSMic Case Study
  35. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  36. Secure microGRID in Cloud: The CoSSMic Case Study
  37. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  38. An Automatic Tool for Benchmark Testing of Cloud Applications
  39. SLAs for cloud applications: agreement protocol and REST-based implementation
  40. Security SLA in Next Generation Data Centers, the SPECS Approach
  41. Security SLAs for Cloud Services: Hadoop Case Study
  42. SLA-based Secure Cloud Application Development
  43. Cloud Security: From Per-Provider to Per-Service Security SLAs
  44. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  45. Per-Service Security SLa: A New Model for Security Management in Clouds
  46. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  47. A framework for cloud-aware development of bag-of-tasks scientific applications
  48. Cloud Challenges towards Free Flow of Data
  49. Methodology to Obtain the Security Controls in Multi-cloud Applications
  50. On the Next Generations of Infrastructure-as-a-Services
  51. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  52. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  53. Towards a Proof-based SLA Management Framework
  54. DoS Protection in the Cloud through the SPECS Services
  55. Economic Denial of Sustainability Mitigation in Cloud Computing
  56. Early Prediction of the Cost of Cloud Usage for HPC Applications
  57. SLA-Based Secure Cloud Application Development: The SPECS Framework
  58. Security Monitoring in the Cloud: An SLA-Based Approach
  59. REST-Based SLA Management for Cloud Applications
  60. Cloud Evaluation: Benchmarking and Monitoring
  61. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  62. Performance prediction of cloud applications through benchmarking and simulation
  63. Stealthy Denial of Service Strategy in Cloud Computing
  64. On the Adoption of Security SLAs in the Cloud
  65. Early Prediction of the Cost of HPC Application Execution in the Cloud
  66. A Portable Tool for Running MPI Applications in the Cloud
  67. Cloud-Aware Development of Scientific Applications
  68. Developing Secure Cloud Applications
  69. An SLA-based brokering platform to provide sensor networks as-a-service
  70. SecLA-Based Negotiation and Brokering of Cloud Resources
  71. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  72. Security as a Service Using an SLA-Based Approach via SPECS
  73. Developing Secure Cloud Applications: A Case Study
  74. Cost/Performance Evaluation for Cloud Applications Using Simulation
  75. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  76. Planting parallel program simulation on the cloud
  77. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  78. Concurrent simulation in the cloud with the mJADES framework
  79. Experiences in building a mOSAIC of clouds
  80. The CloudGrid approach: Security analysis and performance evaluation
  81. SLA-Oriented Security Provisioning for Cloud Computing
  82. Simulation-Based Performance Evaluation of Cloud Applications
  83. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  84. Ontology-based Negotiation of security requirements in cloud
  85. [Front matter]
  86. An SLA-based Broker for Cloud Infrastructures
  87. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  88. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  89. mJADES: Concurrent Simulation in the Cloud
  90. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  91. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  92. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  93. NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
  94. User Centric Service Level Management in mOSAIC Applications
  95. A SLA-based interface for security management in cloud and GRID integrations
  96. Cloud Application Monitoring: The mOSAIC Approach
  97. QoS Management in Cloud@Home Infrastructures
  98. Building an interoperability API for Sky computing
  99. CHASE: An Autonomic Service Engine for Cloud Environments
  100. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  101. Performance Prediction for HPC on Clouds
  102. Cloud@Home: Performance Management Components
  103. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  104. A Cloud Agency for SLA Negotiation and Management
  105. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  106. Architecturing a Sky Computing Platform
  107. Security and Performance Trade-off in PerfCloud
  108. Identity federation in cloud computing
  109. Autonomic Composite-service Architecture with MAWeS
  110. Cloud Agency: A Mobile Agent Based Cloud System
  111. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  112. An interoperability system for authentication and authorisation in VANETs
  113. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  114. A Service for Virtual Cluster Performance Evaluation
  115. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  116. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  117. Self-optimization of secure web services
  118. Simulation-based optimization of multiple-task GRID applications
  119. Message from General Chair(s)
  120. A Framework for Mobile Agent Platform performance Evaluation
  121. Cluster systems and simulation: from benchmarking to off-line performance prediction
  122. Optimizing secure Web Services with MAWeS: A case study
  123. Static evaluation of Certificate Policies for GRID PKIs interoperability
  124. Autonomic Web service development with MAWeS
  125. Performance Oriented Development and Tuning of GRID Applications
  126. Self-optimization of MPI Applications Within an Autonomic Framework
  127. Performance prediction through simulation of a hybrid MPI/OpenMP application
  128. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  129. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  130. Self-optimizing MPI Applications: A Simulation-Based Approach
  131. Performance simulation of a hybrid openMP/MPI application with HeSSE
  132. Security level evaluation: policy and fuzzy techniques
  133. A Performance-Oriented Technique for Hybrid Application Development
  134. Performance modeling of scientific applications: scalability analysis of LAPW0
  135. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  136. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  137. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  138. Access Control in Federated Clouds
  139. Access Control in Federated Clouds
  140. Security Issues in Cloud Federations
  141. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  142. A Simulation-Based Framework for Autonomic Web Services
  143. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  144. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  145. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  146. Mobile Agents Self-optimization with MAWeS
  147. A SLA evaluation methodology in Service Oriented Architectures