All Stories

  1. Automated Identification and Evaluation of Threat Scenarios for U-Space Solutions
  2. SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks
  3. Remanufacturing as a Service: A New Approach to Reduce Remanufacturing Related Barriers
  4. Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems
  5. Advancing ESSecA: a step forward in Automated Penetration Testing
  6. GDPR compliance through standard security controls: An automated approach
  7. A methodology for vulnerability assessment and threat modelling of an e-voting platform based on Ethereum blockchain
  8. Automated threat modelling and risk analysis in e-Government using BPMN
  9. Attacking a packet Analyzer: Caronte case study
  10. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  11. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  12. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  13. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  14. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  15. Risk Analysis Automation Process in IT Security for Cloud Applications
  16. Automated Threat Modelling and Risk Analysis in E-Government Using Bpmn
  17. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  18. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  19. A Conceptual Model for the General Data Protection Regulation
  20. Threat Modeling of Edge-Based IoT Applications
  21. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  22. A cloud-edge smart infrastructures for road safety
  23. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  24. A methodology for automated penetration testing of cloud applications
  25. Discovery of DoS attacks by the ZED-IDS anomaly detector
  26. Toward the automation of threat modeling and risk assessment in IoT systems
  27. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  28. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  29. WETICE 2019 - General Track
  30. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  31. Model-based deployment of secure multi-cloud applications
  32. Automated Risk Analysis for IoT Systems
  33. Internet of things reference architectures, security and interoperability: A survey
  34. Security-by-design in multi-cloud applications: An optimization approach
  35. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  36. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  37. Per-service security SLAs for cloud security management: model and implementation
  38. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  39. Dynamic security assurance in multi-cloud DevOps
  40. Automatically Enforcing Security SLAs in the Cloud
  41. A Security Metric Catalogue for Cloud Applications
  42. MUSA Deployer: Deployment of Multi-cloud Applications
  43. Malware Detection for Secure Microgrids: CoSSMic Case Study
  44. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  45. Secure microGRID in Cloud: The CoSSMic Case Study
  46. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  47. An Automatic Tool for Benchmark Testing of Cloud Applications
  48. SLAs for cloud applications: agreement protocol and REST-based implementation
  49. Security SLA in Next Generation Data Centers, the SPECS Approach
  50. Security SLAs for Cloud Services: Hadoop Case Study
  51. SLA-based Secure Cloud Application Development
  52. Cloud Security: From Per-Provider to Per-Service Security SLAs
  53. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  54. Per-Service Security SLa: A New Model for Security Management in Clouds
  55. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  56. A framework for cloud-aware development of bag-of-tasks scientific applications
  57. Cloud Challenges towards Free Flow of Data
  58. Methodology to Obtain the Security Controls in Multi-cloud Applications
  59. On the Next Generations of Infrastructure-as-a-Services
  60. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  61. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  62. Towards a Proof-based SLA Management Framework
  63. DoS Protection in the Cloud through the SPECS Services
  64. Economic Denial of Sustainability Mitigation in Cloud Computing
  65. Early Prediction of the Cost of Cloud Usage for HPC Applications
  66. SLA-Based Secure Cloud Application Development: The SPECS Framework
  67. Security Monitoring in the Cloud: An SLA-Based Approach
  68. REST-Based SLA Management for Cloud Applications
  69. Cloud Evaluation: Benchmarking and Monitoring
  70. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  71. Performance prediction of cloud applications through benchmarking and simulation
  72. Stealthy Denial of Service Strategy in Cloud Computing
  73. On the Adoption of Security SLAs in the Cloud
  74. Early Prediction of the Cost of HPC Application Execution in the Cloud
  75. A Portable Tool for Running MPI Applications in the Cloud
  76. Cloud-Aware Development of Scientific Applications
  77. Developing Secure Cloud Applications
  78. An SLA-based brokering platform to provide sensor networks as-a-service
  79. SecLA-Based Negotiation and Brokering of Cloud Resources
  80. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  81. Security as a Service Using an SLA-Based Approach via SPECS
  82. Developing Secure Cloud Applications: A Case Study
  83. Cost/Performance Evaluation for Cloud Applications Using Simulation
  84. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  85. Planting parallel program simulation on the cloud
  86. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  87. Concurrent simulation in the cloud with the mJADES framework
  88. Experiences in building a mOSAIC of clouds
  89. The CloudGrid approach: Security analysis and performance evaluation
  90. SLA-Oriented Security Provisioning for Cloud Computing
  91. Simulation-Based Performance Evaluation of Cloud Applications
  92. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  93. Ontology-based Negotiation of security requirements in cloud
  94. [Front matter]
  95. An SLA-based Broker for Cloud Infrastructures
  96. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  97. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  98. mJADES: Concurrent Simulation in the Cloud
  99. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  100. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  101. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  102. NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
  103. User Centric Service Level Management in mOSAIC Applications
  104. A SLA-based interface for security management in cloud and GRID integrations
  105. Cloud Application Monitoring: The mOSAIC Approach
  106. QoS Management in Cloud@Home Infrastructures
  107. Building an interoperability API for Sky computing
  108. CHASE: An Autonomic Service Engine for Cloud Environments
  109. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  110. Performance Prediction for HPC on Clouds
  111. Cloud@Home: Performance Management Components
  112. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  113. A Cloud Agency for SLA Negotiation and Management
  114. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  115. Architecturing a Sky Computing Platform
  116. Security and Performance Trade-off in PerfCloud
  117. Identity federation in cloud computing
  118. Autonomic Composite-service Architecture with MAWeS
  119. Cloud Agency: A Mobile Agent Based Cloud System
  120. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  121. An interoperability system for authentication and authorisation in VANETs
  122. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  123. A Service for Virtual Cluster Performance Evaluation
  124. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  125. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  126. Self-optimization of secure web services
  127. Simulation-based optimization of multiple-task GRID applications
  128. Message from General Chair(s)
  129. A Framework for Mobile Agent Platform performance Evaluation
  130. Cluster systems and simulation: from benchmarking to off-line performance prediction
  131. Optimizing secure Web Services with MAWeS: A case study
  132. Static evaluation of Certificate Policies for GRID PKIs interoperability
  133. Autonomic Web service development with MAWeS
  134. Performance Oriented Development and Tuning of GRID Applications
  135. Self-optimization of MPI Applications Within an Autonomic Framework
  136. Performance prediction through simulation of a hybrid MPI/OpenMP application
  137. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  138. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  139. Self-optimizing MPI Applications: A Simulation-Based Approach
  140. Performance simulation of a hybrid openMP/MPI application with HeSSE
  141. Security level evaluation: policy and fuzzy techniques
  142. A Performance-Oriented Technique for Hybrid Application Development
  143. Performance modeling of scientific applications: scalability analysis of LAPW0
  144. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  145. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  146. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  147. Access Control in Federated Clouds
  148. Access Control in Federated Clouds
  149. Security Issues in Cloud Federations
  150. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  151. A Simulation-Based Framework for Autonomic Web Services
  152. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  153. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  154. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  155. Mobile Agents Self-optimization with MAWeS
  156. A SLA evaluation methodology in Service Oriented Architectures