All Stories

  1. Advancing ESSecA: a step forward in Automated Penetration Testing
  2. GDPR compliance through standard security controls: An automated approach
  3. A methodology for vulnerability assessment and threat modelling of an e-voting platform based on Ethereum blockchain
  4. Automated threat modelling and risk analysis in e-Government using BPMN
  5. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
  6. ESSecA: an Automated Expert System for Threat Modeling and Penetration Testing for IoT Ecosystems
  7. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
  8. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
  9. Automated Threat Modeling Approaches: Comparison of Open Source Tools
  10. Risk Analysis Automation Process in IT Security for Cloud Applications
  11. Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
  12. Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing
  13. A Conceptual Model for the General Data Protection Regulation
  14. Threat Modeling of Edge-Based IoT Applications
  15. Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security
  16. A cloud-edge smart infrastructures for road safety
  17. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
  18. A methodology for automated penetration testing of cloud applications
  19. Discovery of DoS attacks by the ZED-IDS anomaly detector
  20. Toward the automation of threat modeling and risk assessment in IoT systems
  21. Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques
  22. Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud
  23. WETICE 2019 - General Track
  24. Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems
  25. Model-based deployment of secure multi-cloud applications
  26. Automated Risk Analysis for IoT Systems
  27. Internet of things reference architectures, security and interoperability: A survey
  28. Security-by-design in multi-cloud applications: An optimization approach
  29. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
  30. A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
  31. Per-service security SLAs for cloud security management: model and implementation
  32. Cloud Security Requirements Analysis and Security Policy Development Using HOOMT
  33. Dynamic security assurance in multi-cloud DevOps
  34. Automatically Enforcing Security SLAs in the Cloud
  35. A Security Metric Catalogue for Cloud Applications
  36. MUSA Deployer: Deployment of Multi-cloud Applications
  37. Malware Detection for Secure Microgrids: CoSSMic Case Study
  38. Local and interregional alpha EEG dynamics dissociate between memory for search and memory for recognition
  39. Secure microGRID in Cloud: The CoSSMic Case Study
  40. Security Assurance of (Multi-)Cloud Application with Security SLA Composition
  41. An Automatic Tool for Benchmark Testing of Cloud Applications
  42. SLAs for cloud applications: agreement protocol and REST-based implementation
  43. Security SLA in Next Generation Data Centers, the SPECS Approach
  44. Security SLAs for Cloud Services: Hadoop Case Study
  45. SLA-based Secure Cloud Application Development
  46. Cloud Security: From Per-Provider to Per-Service Security SLAs
  47. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services
  48. Per-Service Security SLa: A New Model for Security Management in Clouds
  49. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework
  50. A framework for cloud-aware development of bag-of-tasks scientific applications
  51. Cloud Challenges towards Free Flow of Data
  52. Methodology to Obtain the Security Controls in Multi-cloud Applications
  53. On the Next Generations of Infrastructure-as-a-Services
  54. Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study
  55. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
  56. Towards a Proof-based SLA Management Framework
  57. DoS Protection in the Cloud through the SPECS Services
  58. Economic Denial of Sustainability Mitigation in Cloud Computing
  59. Early Prediction of the Cost of Cloud Usage for HPC Applications
  60. SLA-Based Secure Cloud Application Development: The SPECS Framework
  61. Security Monitoring in the Cloud: An SLA-Based Approach
  62. REST-Based SLA Management for Cloud Applications
  63. Cloud Evaluation: Benchmarking and Monitoring
  64. Assisted sintering of silver nanoparticle inkjet ink on paper with active coatings
  65. Performance prediction of cloud applications through benchmarking and simulation
  66. Stealthy Denial of Service Strategy in Cloud Computing
  67. On the Adoption of Security SLAs in the Cloud
  68. Early Prediction of the Cost of HPC Application Execution in the Cloud
  69. A Portable Tool for Running MPI Applications in the Cloud
  70. Cloud-Aware Development of Scientific Applications
  71. Developing Secure Cloud Applications
  72. An SLA-based brokering platform to provide sensor networks as-a-service
  73. SecLA-Based Negotiation and Brokering of Cloud Resources
  74. An SLA-Based Approach to Manage Sensor Networks as-a-Service
  75. Security as a Service Using an SLA-Based Approach via SPECS
  76. Developing Secure Cloud Applications: A Case Study
  77. Cost/Performance Evaluation for Cloud Applications Using Simulation
  78. The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks
  79. Planting parallel program simulation on the cloud
  80. A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud
  81. Concurrent simulation in the cloud with the mJADES framework
  82. Experiences in building a mOSAIC of clouds
  83. The CloudGrid approach: Security analysis and performance evaluation
  84. SLA-Oriented Security Provisioning for Cloud Computing
  85. Simulation-Based Performance Evaluation of Cloud Applications
  86. An intrusion detection framework for supporting SLA assessment in Cloud Computing
  87. Ontology-based Negotiation of security requirements in cloud
  88. [Front matter]
  89. An SLA-based Broker for Cloud Infrastructures
  90. Benchmarks in the Cloud: The mOSAIC Benchmarking Framework
  91. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach
  92. mJADES: Concurrent Simulation in the Cloud
  93. Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs
  94. Intrusion Tolerance of Stealth DoS Attacks to Web Services
  95. Enhancing an Autonomic Cloud Architecture with Mobile Agents
  96. NEGOTIATION POLICIES FOR PROVISIONING OF CLOUD RESOURCES
  97. User Centric Service Level Management in mOSAIC Applications
  98. A SLA-based interface for security management in cloud and GRID integrations
  99. Cloud Application Monitoring: The mOSAIC Approach
  100. QoS Management in Cloud@Home Infrastructures
  101. Building an interoperability API for Sky computing
  102. CHASE: An Autonomic Service Engine for Cloud Environments
  103. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services
  104. Performance Prediction for HPC on Clouds
  105. Cloud@Home: Performance Management Components
  106. The Cloud@Home Project: Towards a New Enhanced Computing Paradigm
  107. A Cloud Agency for SLA Negotiation and Management
  108. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
  109. Architecturing a Sky Computing Platform
  110. Security and Performance Trade-off in PerfCloud
  111. Identity federation in cloud computing
  112. Autonomic Composite-service Architecture with MAWeS
  113. Cloud Agency: A Mobile Agent Based Cloud System
  114. Instantaneous Load Dependent Servers (iLDS) Model for Web Services
  115. An interoperability system for authentication and authorisation in VANETs
  116. Web Services Resilience Evaluation using LDS Load dependent Server Models.
  117. A Service for Virtual Cluster Performance Evaluation
  118. PerfCloud: Performance-Oriented Integration of Cloud and GRID
  119. PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
  120. Self-optimization of secure web services
  121. Simulation-based optimization of multiple-task GRID applications
  122. Message from General Chair(s)
  123. A Framework for Mobile Agent Platform performance Evaluation
  124. Cluster systems and simulation: from benchmarking to off-line performance prediction
  125. Optimizing secure Web Services with MAWeS: A case study
  126. Static evaluation of Certificate Policies for GRID PKIs interoperability
  127. Autonomic Web service development with MAWeS
  128. Performance Oriented Development and Tuning of GRID Applications
  129. Self-optimization of MPI Applications Within an Autonomic Framework
  130. Performance prediction through simulation of a hybrid MPI/OpenMP application
  131. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
  132. Security design and evaluation in a VoIP secure infrastracture: a policy based approach
  133. Self-optimizing MPI Applications: A Simulation-Based Approach
  134. Performance simulation of a hybrid openMP/MPI application with HeSSE
  135. Security level evaluation: policy and fuzzy techniques
  136. A Performance-Oriented Technique for Hybrid Application Development
  137. Performance modeling of scientific applications: scalability analysis of LAPW0
  138. Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems
  139. MetaPL: A Notation System for Parallel Program Description and Performance Analysis
  140. The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project
  141. Access Control in Federated Clouds
  142. Access Control in Federated Clouds
  143. Security Issues in Cloud Federations
  144. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
  145. A Simulation-Based Framework for Autonomic Web Services
  146. Performance-Driven Development of a Web Services Application using MetaPL/HeSSE
  147. Building Autonomic and Secure Service Oriented Architectures with MAWeS
  148. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
  149. Mobile Agents Self-optimization with MAWeS
  150. A SLA evaluation methodology in Service Oriented Architectures