Author of the publication

Intrusion Tolerance as a Service - A SLA-based Solution.

, and . CLOSER, page 375-384. SciTePress, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Level Evaluation: Policy and Fuzzy Techniques., , , and . ITCC (2), page 752-. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach., , , and . ITCC (1), page 727-732. IEEE Computer Society, (2005)A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud., , and . AINA Workshops, page 1235-1240. IEEE Computer Society, (2013)Performance-Driven Development of a Web Services Application using MetaPL/HeSSE., , , , and . PDP, page 12-19. IEEE Computer Society, (2005)Benchmarks in the Cloud: The mOSAIC Benchmarking Framework., and . SYNASC, page 415-422. IEEE Computer Society, (2012)Autonomic Web Service Development with MAWeS., , and . AINA (2), page 504-508. IEEE Computer Society, (2006)Threat Modeling based Penetration Testing: The Open Energy Monitor Case study., , and . SIN, page 8:1-8:8. ACM, (2020)Automated Threat Modeling Approaches: Comparison of Open Source Tools., , and . QUATIC, volume 1621 of Communications in Computer and Information Science, page 250-265. Springer, (2022)Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security., and . CLOSER, page 87-98. SCITEPRESS, (2021)Methodology to Obtain the Security Controls in Multi-cloud Applications., , , , , and . CLOSER (1), page 327-332. SciTePress, (2016)