From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain | 1 | 0.35 | 2021 |
Certification-Based Cloud Adaptation | 3 | 0.40 | 2021 |
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem | 0 | 0.34 | 2020 |
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems | 0 | 0.34 | 2019 |
Data Protection as a Service in the Multi-Cloud Environment | 0 | 0.34 | 2019 |
Dynamic Access Control to Semantics-Aware Streamed Process Logs. | 0 | 0.34 | 2019 |
Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts | 0 | 0.34 | 2019 |
A Knowledge-Based IoT Security Checker. | 0 | 0.34 | 2018 |
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. | 0 | 0.34 | 2018 |
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. | 0 | 0.34 | 2018 |
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency. | 2 | 0.65 | 2017 |
Pay-with-a-Selfie, a human-centred digital payment system. | 1 | 0.37 | 2017 |
A Certification Technique for Cloud Security Adaptation | 2 | 0.36 | 2016 |
A framework for big data as a service | 1 | 0.36 | 2015 |
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment | 0 | 0.34 | 2015 |
From Security to Assurance in the Cloud: A Survey | 39 | 1.38 | 2015 |
Lightweight secure storage model with fault-tolerance in cloud environment | 1 | 0.35 | 2014 |
On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit. | 4 | 0.41 | 2014 |
DEMODS: A Description Model for Data-as-a-Service | 8 | 0.54 | 2012 |
Legacy Application Migration to the Cloud: Practicability and Methodology | 11 | 1.09 | 2012 |
Harnessing the power of P2P technology to build PC2 — An open and free cloud computing platform | 1 | 0.36 | 2012 |