All Stories

  1. Correct by Design, Complete by Iteration: A Graph-based Framework for Automated Security Assessment
  2. Automated Identification and Evaluation of Threat Scenarios for U-Space Solutions
  3. SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks
  4. Remanufacturing as a Service: A New Approach to Reduce Remanufacturing Related Barriers
  5. Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems
  6. Advancing ESSecA: a step forward in Automated Penetration Testing
  7. GDPR compliance through standard security controls: An automated approach
  8. A methodology for vulnerability assessment and threat modelling of an e-voting platform based on Ethereum blockchain
  9. Automated threat modelling and risk analysis in e-Government using BPMN
  10. Attacking a packet Analyzer: Caronte case study
  11. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  12. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  13. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  14. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  15. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  16. Risk Analysis Automation Process in IT Security for Cloud Applications
  17. Automated Threat Modelling and Risk Analysis in E-Government Using Bpmn
  18. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  19. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  20. A Conceptual Model for the General Data Protection Regulation
  21. Threat Modeling of Edge-Based IoT Applications
  22. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  23. A cloud-edge smart infrastructures for road safety
  24. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  25. A methodology for automated penetration testing of cloud applications
  26. Discovery of DoS attacks by the ZED-IDS anomaly detector
  27. Toward the automation of threat modeling and risk assessment in IoT systems
  28. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  29. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  30. WETICE 2019 - General Track
  31. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  32. Model-based deployment of secure multi-cloud applications
  33. Automated Risk Analysis for IoT Systems
  34. Internet of things reference architectures, security and interoperability: A survey
  35. Security-by-design in multi-cloud applications: An optimization approach
  36. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  37. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  38. Per-service security SLAs for cloud security management: model and implementation
  39. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  40. Dynamic security assurance in multi-cloud DevOps
  41. Automatically Enforcing Security SLAs in the Cloud
  42. A Security Metric Catalogue for Cloud Applications
  43. MUSA Deployer: Deployment of Multi-cloud Applications
  44. Malware Detection for Secure Microgrids: CoSSMic Case Study
  45. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  46. Secure microGRID in Cloud: The CoSSMic Case Study
  47. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  48. An Automatic Tool for Benchmark Testing of Cloud Applications
  49. SLAs for cloud applications: agreement protocol and REST-based implementation
  50. Security SLA in Next Generation Data Centers, the SPECS Approach
  51. Security SLAs for Cloud Services: Hadoop Case Study
  52. SLA-based Secure Cloud Application Development
  53. Cloud Security: From Per-Provider to Per-Service Security SLAs
  54. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  55. Per-Service Security SLa: A New Model for Security Management in Clouds
  56. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  57. A framework for cloud-aware development of bag-of-tasks scientific applications
  58. Cloud Challenges towards Free Flow of Data
  59. Methodology to Obtain the Security Controls in Multi-cloud Applications
  60. On the Next Generations of Infrastructure-as-a-Services
  61. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  62. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  63. Towards a Proof-based SLA Management Framework
  64. DoS Protection in the Cloud through the SPECS Services
  65. Economic Denial of Sustainability Mitigation in Cloud Computing
  66. Early Prediction of the Cost of Cloud Usage for HPC Applications
  67. SLA-Based Secure Cloud Application Development: The SPECS Framework
  68. Security Monitoring in the Cloud: An SLA-Based Approach
  69. REST-Based SLA Management for Cloud Applications
  70. Cloud Evaluation: Benchmarking and Monitoring
  71. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  72. Performance prediction of cloud applications through benchmarking and simulation
  73. Stealthy Denial of Service Strategy in Cloud Computing
  74. On the Adoption of Security SLAs in the Cloud
  75. Early Prediction of the Cost of HPC Application Execution in the Cloud
  76. A Portable Tool for Running MPI Applications in the Cloud
  77. Cloud-Aware Development of Scientific Applications
  78. Developing Secure Cloud Applications
  79. An SLA-based brokering platform to provide sensor networks as-a-service
  80. SecLA-Based Negotiation and Brokering of Cloud Resources
  81. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  82. Security as a Service Using an SLA-Based Approach via SPECS
  83. Developing Secure Cloud Applications: A Case Study
  84. Cost/Performance Evaluation for Cloud Applications Using Simulation
  85. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  86. Planting parallel program simulation on the cloud
  87. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  88. Concurrent simulation in the cloud with the mJADES framework
  89. Experiences in building a mOSAIC of clouds
  90. The CloudGrid approach: Security analysis and performance evaluation
  91. SLA-Oriented Security Provisioning for Cloud Computing
  92. Simulation-Based Performance Evaluation of Cloud Applications
  93. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  94. Ontology-based Negotiation of security requirements in cloud
  95. [Front matter]
  96. An SLA-based Broker for Cloud Infrastructures
  97. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  98. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  99. mJADES: Concurrent Simulation in the Cloud
  100. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  101. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  102. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  103. NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
  104. User Centric Service Level Management in mOSAIC Applications
  105. A SLA-based interface for security management in cloud and GRID integrations
  106. Cloud Application Monitoring: The mOSAIC Approach
  107. QoS Management in Cloud@Home Infrastructures
  108. Building an interoperability API for Sky computing
  109. CHASE: An Autonomic Service Engine for Cloud Environments
  110. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  111. Performance Prediction for HPC on Clouds
  112. Cloud@Home: Performance Management Components
  113. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  114. A Cloud Agency for SLA Negotiation and Management
  115. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  116. Architecturing a Sky Computing Platform
  117. Security and Performance Trade-off in PerfCloud
  118. Identity federation in cloud computing
  119. Autonomic Composite-service Architecture with MAWeS
  120. Cloud Agency: A Mobile Agent Based Cloud System
  121. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  122. An interoperability system for authentication and authorisation in VANETs
  123. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  124. A Service for Virtual Cluster Performance Evaluation
  125. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  126. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  127. Self-optimization of secure web services
  128. Simulation-based optimization of multiple-task GRID applications
  129. Message from General Chair(s)
  130. A Framework for Mobile Agent Platform performance Evaluation
  131. Cluster systems and simulation: from benchmarking to off-line performance prediction
  132. Optimizing secure Web Services with MAWeS: A case study
  133. Static evaluation of Certificate Policies for GRID PKIs interoperability
  134. Autonomic Web service development with MAWeS
  135. Performance Oriented Development and Tuning of GRID Applications
  136. Self-optimization of MPI Applications Within an Autonomic Framework
  137. Performance prediction through simulation of a hybrid MPI/OpenMP application
  138. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  139. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  140. Self-optimizing MPI Applications: A Simulation-Based Approach
  141. Performance simulation of a hybrid openMP/MPI application with HeSSE
  142. Security level evaluation: policy and fuzzy techniques
  143. A Performance-Oriented Technique for Hybrid Application Development
  144. Performance modeling of scientific applications: scalability analysis of LAPW0
  145. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  146. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  147. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  148. Access Control in Federated Clouds
  149. Access Control in Federated Clouds
  150. Security Issues in Cloud Federations
  151. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  152. A Simulation-Based Framework for Autonomic Web Services
  153. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  154. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  155. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  156. Mobile Agents Self-optimization with MAWeS
  157. A SLA evaluation methodology in Service Oriented Architectures