José Luis Vivas

According to our database1, José Luis Vivas authored at least 14 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A predictive approach for enhancing resource utilization in PaaS clouds.
Proceedings of the Symposium on Applied Computing, 2017

Security and privacy preserving data aggregation in cloud computing.
Proceedings of the Symposium on Applied Computing, 2017

2016
Enhancing fairness in P2P cloud federations.
Comput. Electr. Eng., 2016

Enhancing P2P Cooperation through Transitive Indirect Reciprocity.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Flexible Federation of Cloud Providers: The EUBrazil Cloud Connect Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Incentivising Resource Sharing in Federated Clouds.
Proceedings of the Distributed Applications and Interoperable Systems, 2015

2011
A methodology for security assurance-driven system development.
Requir. Eng., 2011

2010
A security framework for a workflow-based grid development platform.
Comput. Stand. Interfaces, 2010

2009
Security assurance during the software development cycle.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2005
Specification and design of advanced authentication and authorization services.
Comput. Stand. Interfaces, 2005

2003
Towards a Business Process-Driven Framework for Security Engineering with the UML.
Proceedings of the Information Security, 6th International Conference, 2003

High-level specification of security systems.
Proceedings of the Global Telecommunications Conference, 2003

A business process-driven approach to security engineering.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

How to Specify Security Services: A Practical Approach.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...