Christian Otterstad and Tetiana Yarygina |
Low-level Exploitation Mitigation by Diverse Microservices |
Ehtesham Zahoor, Zubaria Asma and Olivier Perrin |
A Formal Approach for the Verification of AWS IAM Access Control Policies |
Frederic Pohl and Hans Dieter Schotten |
Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance |
Hamid Arabnejad, Frank Fowley, Claus Pahl, Areeg Samir and Giovani Estrada |
A Fuzzy Load Balancer for Adaptive Fault Tolerance Management in Cloud Platforms |
Iraklis Paraskakis, Simeon Veloudis and Christos Petsos |
Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments |
Luciano Baresi, Danilo Filgueira Mendonça and Martin Garriga |
Empowering Low-latency Applications through a Serverless Edge Computing Architecture |
Luciano Baresi, Martin Garriga and Alan De Renzis |
On Identifying Appropriate Microservices |
Mandy Weißbach and Wolf Zimmermann |
On Abstraction-Based Deadlock-Analysis in Service-Oriented Systems with Recursion |
Marco Cremaschi and Flavio De Paoli |
Toward automatic semantic API descriptions to support services composition |
Marco Montali and Pierluigi Plebani |
IoT-based Compliance Checking of Multi-party Business Processes modeled with Commitments |
Max Plauth, Lena Feinbube and Andreas Polze |
A Performance Survey of Lightweight Virtualization Techniques |
Nikolaos Bezirgiannis, Frank De Boer and Stijn De Gouw |
Human-in-the-Loop Simulation of Cloud Services |
Nivethika Mahasivam, Nikolay Nikolov, Dina Sukhobok and Dumitru Roman |
Data preparation as a service based on Apache Spark |
Zoltan Mann |
Two are better than one: An algorithm portfolio approach to cloud resource management |