All Stories

  1. Threat Analysis and Security Assessment of an HPC System
  2. Correct by Design, Complete by Iteration: A Graph-based Framework for Automated Security Assessment
  3. Automated Identification and Evaluation of Threat Scenarios for U-Space Solutions
  4. SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks
  5. Remanufacturing as a Service: A New Approach to Reduce Remanufacturing Related Barriers
  6. Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems
  7. Advancing ESSecA: a step forward in Automated Penetration Testing
  8. GDPR compliance through standard security controls: An automated approach
  9. A methodology for vulnerability assessment and threat modelling of an e-voting platform based on Ethereum blockchain
  10. Automated threat modelling and risk analysis in e-Government using BPMN
  11. Attacking a packet Analyzer: Caronte case study
  12. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  13. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  14. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  15. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  16. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  17. Risk Analysis Automation Process in IT Security for Cloud Applications
  18. Automated Threat Modelling and Risk Analysis in E-Government Using Bpmn
  19. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  20. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  21. A Conceptual Model for the General Data Protection Regulation
  22. Threat Modeling of Edge-Based IoT Applications
  23. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  24. A cloud-edge smart infrastructures for road safety
  25. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  26. A methodology for automated penetration testing of cloud applications
  27. Discovery of DoS attacks by the ZED-IDS anomaly detector
  28. Toward the automation of threat modeling and risk assessment in IoT systems
  29. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  30. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  31. WETICE 2019 - General Track
  32. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  33. Model-based deployment of secure multi-cloud applications
  34. Automated Risk Analysis for IoT Systems
  35. Internet of things reference architectures, security and interoperability: A survey
  36. Security-by-design in multi-cloud applications: An optimization approach
  37. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  38. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  39. Per-service security SLAs for cloud security management: model and implementation
  40. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  41. Dynamic security assurance in multi-cloud DevOps
  42. Automatically Enforcing Security SLAs in the Cloud
  43. A Security Metric Catalogue for Cloud Applications
  44. MUSA Deployer: Deployment of Multi-cloud Applications
  45. Malware Detection for Secure Microgrids: CoSSMic Case Study
  46. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  47. Secure microGRID in Cloud: The CoSSMic Case Study
  48. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  49. An Automatic Tool for Benchmark Testing of Cloud Applications
  50. SLAs for cloud applications: agreement protocol and REST-based implementation
  51. Security SLA in Next Generation Data Centers, the SPECS Approach
  52. Security SLAs for Cloud Services: Hadoop Case Study
  53. SLA-based Secure Cloud Application Development
  54. Cloud Security: From Per-Provider to Per-Service Security SLAs
  55. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  56. Per-Service Security SLa: A New Model for Security Management in Clouds
  57. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  58. A framework for cloud-aware development of bag-of-tasks scientific applications
  59. Cloud Challenges towards Free Flow of Data
  60. Methodology to Obtain the Security Controls in Multi-cloud Applications
  61. On the Next Generations of Infrastructure-as-a-Services
  62. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  63. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  64. Towards a Proof-based SLA Management Framework
  65. DoS Protection in the Cloud through the SPECS Services
  66. Economic Denial of Sustainability Mitigation in Cloud Computing
  67. Early Prediction of the Cost of Cloud Usage for HPC Applications
  68. SLA-Based Secure Cloud Application Development: The SPECS Framework
  69. Security Monitoring in the Cloud: An SLA-Based Approach
  70. REST-Based SLA Management for Cloud Applications
  71. Cloud Evaluation: Benchmarking and Monitoring
  72. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  73. Performance prediction of cloud applications through benchmarking and simulation
  74. Stealthy Denial of Service Strategy in Cloud Computing
  75. On the Adoption of Security SLAs in the Cloud
  76. Early Prediction of the Cost of HPC Application Execution in the Cloud
  77. A Portable Tool for Running MPI Applications in the Cloud
  78. Cloud-Aware Development of Scientific Applications
  79. Developing Secure Cloud Applications
  80. An SLA-based brokering platform to provide sensor networks as-a-service
  81. SecLA-Based Negotiation and Brokering of Cloud Resources
  82. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  83. Security as a Service Using an SLA-Based Approach via SPECS
  84. Developing Secure Cloud Applications: A Case Study
  85. Cost/Performance Evaluation for Cloud Applications Using Simulation
  86. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  87. Planting parallel program simulation on the cloud
  88. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  89. Concurrent simulation in the cloud with the mJADES framework
  90. Experiences in building a mOSAIC of clouds
  91. The CloudGrid approach: Security analysis and performance evaluation
  92. SLA-Oriented Security Provisioning for Cloud Computing
  93. Simulation-Based Performance Evaluation of Cloud Applications
  94. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  95. Ontology-based Negotiation of security requirements in cloud
  96. [Front matter]
  97. An SLA-based Broker for Cloud Infrastructures
  98. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  99. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  100. mJADES: Concurrent Simulation in the Cloud
  101. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  102. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  103. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  104. NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
  105. User Centric Service Level Management in mOSAIC Applications
  106. A SLA-based interface for security management in cloud and GRID integrations
  107. Cloud Application Monitoring: The mOSAIC Approach
  108. QoS Management in Cloud@Home Infrastructures
  109. Building an interoperability API for Sky computing
  110. CHASE: An Autonomic Service Engine for Cloud Environments
  111. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  112. Performance Prediction for HPC on Clouds
  113. Cloud@Home: Performance Management Components
  114. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  115. A Cloud Agency for SLA Negotiation and Management
  116. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  117. Architecturing a Sky Computing Platform
  118. Security and Performance Trade-off in PerfCloud
  119. Identity federation in cloud computing
  120. Autonomic Composite-service Architecture with MAWeS
  121. Cloud Agency: A Mobile Agent Based Cloud System
  122. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  123. An interoperability system for authentication and authorisation in VANETs
  124. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  125. A Service for Virtual Cluster Performance Evaluation
  126. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  127. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  128. Self-optimization of secure web services
  129. Simulation-based optimization of multiple-task GRID applications
  130. Message from General Chair(s)
  131. A Framework for Mobile Agent Platform performance Evaluation
  132. Cluster systems and simulation: from benchmarking to off-line performance prediction
  133. Optimizing secure Web Services with MAWeS: A case study
  134. Static evaluation of Certificate Policies for GRID PKIs interoperability
  135. Autonomic Web service development with MAWeS
  136. Performance Oriented Development and Tuning of GRID Applications
  137. Self-optimization of MPI Applications Within an Autonomic Framework
  138. Performance prediction through simulation of a hybrid MPI/OpenMP application
  139. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  140. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  141. Self-optimizing MPI Applications: A Simulation-Based Approach
  142. Performance simulation of a hybrid openMP/MPI application with HeSSE
  143. Security level evaluation: policy and fuzzy techniques
  144. A Performance-Oriented Technique for Hybrid Application Development
  145. Performance modeling of scientific applications: scalability analysis of LAPW0
  146. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  147. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  148. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  149. Access Control in Federated Clouds
  150. Access Control in Federated Clouds
  151. Security Issues in Cloud Federations
  152. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  153. A Simulation-Based Framework for Autonomic Web Services
  154. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  155. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  156. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  157. Mobile Agents Self-optimization with MAWeS
  158. A SLA evaluation methodology in Service Oriented Architectures