Author of the publication

Correctness of Service Components and Service Component Ensembles.

, , , , , and . The ASCENS Approach, volume 8998 of Lecture Notes in Computer Science, Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tools for Ensemble Design and Runtime., , , , , , , , , and 5 other author(s). The ASCENS Approach, volume 8998 of Lecture Notes in Computer Science, Springer, (2015)Correctness of Service Components and Service Component Ensembles., , , , , and . The ASCENS Approach, volume 8998 of Lecture Notes in Computer Science, Springer, (2015)PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain., , , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Towards Static Analysis of Policy-Based Self-adaptive Computing Systems., , , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 554-569. (2016)On Programming and Policing Autonomic Computing Systems., , , and . ISoLA (1), volume 8802 of Lecture Notes in Computer Science, page 164-183. Springer, (2014)Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - - A Practical Approach -., , , and . WS-FM, volume 8379 of Lecture Notes in Computer Science, page 85-105. Springer, (2013)Differentially Private Data Sharing in a Cloud Federation with Blockchain., , , and . IEEE Cloud Computing, 5 (6): 69-79 (2018)A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies., , , and . IEEE Trans. Software Eng., 45 (1): 2-33 (2019)Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case., , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data., , , and . HEALTHINF, page 263-268. SciTePress, (2013)