Author of the publication

Playing with Our CAT and Communication-Centric Applications.

, , , and . FORTE, volume 9688 of Lecture Notes in Computer Science, page 62-73. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameterized Structured Operational Semantics., and . Fundam. Informaticae, 34 (1-2): 1-31 (1998)A Language-Based Approach to Autonomic Computing., , , and . FMCO, volume 7542 of Lecture Notes in Computer Science, page 25-48. Springer, (2011)Static Analysis for Stack Inspection., , and . ConCoord, volume 54 of Electronic Notes in Theoretical Computer Science, page 69-80. Elsevier, (2001)Secure Service Orchestration., , , and . FOSAD, volume 4677 of Lecture Notes in Computer Science, page 24-74. Springer, (2007)Security Issues in Service Composition., , and . FMOODS, volume 4037 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)Placing FaaS in the Fog, Securely., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 166-179. CEUR-WS.org, (2021)Secure Apps in the Fog: Anything to Declare?, , and . ESOCC Workshops, volume 1115 of Communications in Computer and Information Science, page 46-61. Springer, (2018)Secure Partitioning of Composite Cloud Applications., , , , and . ESOCC, volume 13226 of Lecture Notes in Computer Science, page 47-64. Springer, (2022)Model Checking Usage Policies., , , and . TGC, volume 5474 of Lecture Notes in Computer Science, page 19-35. Springer, (2008)Security-Aware Program Transformations., , and . ICTCS, volume 2841 of Lecture Notes in Computer Science, page 355-368. Springer, (2003)