Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Model Generation for Cloud Infrastructure Planning., , , , , and . SMC, page 4098-4103. IEEE, (2013)Execution Support to Long Running Workflows., , and . CIT, page 496-503. IEEE Computer Society, (2014)Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud., , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)A survey on automation of security requirements in service-based business processes., , and . Int. J. Web Eng. Technol., 13 (1): 3-29 (2018)Comparative Study of Service-Based Security-Aware Business Processes Automation Tools., , , , and . SMC, page 1413-1418. IEEE, (2013)Capacity planning of EFT service hosted on elastic IaaS., , , , , and . SMC, page 1749-1754. IEEE, (2012)Invasive technique for measuring the energy consumption of mobile devices applications in mobile cloud environments., , , , and . SMC, page 2724-2729. IEEE, (2017)A multi-perspective methodology for evaluating the security maturity of data centers., , and . SMC, page 1196-1201. IEEE, (2017)Incorporating Security Requirements into Service Composition: From Modelling to Execution., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 373-388. (2009)Performance and Cost Modeling Strategy for Cloud Infrastructure Planning., , , and . IEEE CLOUD, page 546-553. IEEE Computer Society, (2014)