Massimiliano Rak

Orcid: 0000-0001-6708-4032

According to our database1, Massimiliano Rak authored at least 170 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools.
Softw. Qual. J., March, 2024

DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Automated threat modelling and risk analysis in e-Government using BPMN.
Connect. Sci., December, 2023

A survey on auto-scaling: how to exploit cloud elasticity.
Int. J. Grid Util. Comput., 2023

Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach.
IEEE Access, 2023

Attacking a packet Analyzer: Caronte case study.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls.
Comput. Electr. Eng., 2022

ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems.
Comput. Electr. Eng., 2022

Automated Threat Modeling Approaches: Comparison of Open Source Tools.
Proceedings of the Quality of Information and Communications Technology, 2022

MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

A Semantic Methodology for Security Controls Verification in Public Administration Business Processes.
Proceedings of the Complex, Intelligent and Software Intensive Systems - Proceedings of the 16th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2022), June 29, 2022

MetaSEnD: A Security Enabled Development Life Cycle Meta-Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Black-box load testing to support auto-scaling web applications in the cloud.
Int. J. Grid Util. Comput., 2021

Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data.
Comput. Secur., 2021

Threat Modeling of Edge-Based IoT Applications.
Proceedings of the Quality of Information and Communications Technology, 2021

Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis.
Proceedings of the Italian Conference on Cybersecurity, 2021

A Conceptual Model for the General Data Protection Regulation.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Risk Analysis Automation Process in IT Security for Cloud Applications.
Proceedings of the Cloud Computing and Services Science - 11th International Conference, 2021

Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach.
J. Syst. Softw., 2020

A methodology for automated penetration testing of cloud applications.
Int. J. Grid Util. Comput., 2020

Auto-scaling Applications in the Cloud by Simple Indexes with Complex Loads.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Threat Modeling based Penetration Testing: The Open Energy Monitor Case study.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

A Cloud SecDevOps Methodology: From Design to Testing.
Proceedings of the Quality of Information and Communications Technology, 2020

Systematic IoT Penetration Testing: Alexa Case Study.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

A case study on the representativeness of public DoS network traffic data for cybersecurity research.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Discovery of DoS attacks by the ZED-IDS anomaly detector.
J. High Speed Networks, 2019

Toward the automation of threat modeling and risk assessment in IoT systems.
Internet Things, 2019

Model-based deployment of secure multi-cloud applications.
Int. J. Grid Util. Comput., 2019

Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems.
IET Softw., 2019

WETICE 2019 - General Track.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Optimization and Validation of eGovernment Business Processes with Support of Semantic Techniques.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Auto-scaling in the Cloud: Current Status and Perspectives.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

2018
Security-by-design in multi-cloud applications: An optimization approach.
Inf. Sci., 2018

Internet of things reference architectures, security and interoperability: A survey.
Internet Things, 2018

Per-service security SLAs for cloud security management: model and implementation.
Int. J. Grid Util. Comput., 2018

Towards Automated Penetration Testing for Cloud Applications.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Automated Risk Analysis for IoT Systems.
Proceedings of the Advances on P2P, 2018

2017
Automatically Enforcing Security SLAs in the Cloud.
IEEE Trans. Serv. Comput., 2017

SLAs for cloud applications: agreement protocol and REST-based implementation.
Int. J. Grid Util. Comput., 2017

MUSA Deployer: Deployment of Multi-cloud Applications.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Malware Detection for Secure Microgrids: CoSSMic Case Study.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Secure microGRID in Cloud: The CoSSMic Case Study.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Security Assurance of (Multi-)Cloud Application with Security SLA Composition.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

Dynamic security assurance in multi-cloud DevOps.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

An Automatic Tool for Benchmark Testing of Cloud Applications.
Proceedings of the CLOSER 2017, 2017

A Security Metric Catalogue for Cloud Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
SLA-based Secure Cloud Application Development.
Scalable Comput. Pract. Exp., 2016

A framework for cloud-aware development of bag-of-tasks scientific applications.
Int. J. Grid Util. Comput., 2016

Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications.
ERCIM News, 2016

Per-Service Security SLa: A New Model for Security Management in Clouds.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Cloud Security: From Per-Provider to Per-Service Security SLAs.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Cloud Challenges towards Free Flow of Data.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Towards a Proof-based SLA Management Framework - The SPECS Approach.
Proceedings of the CLOSER 2016, 2016

Security SLA in Next Generation Data Centers, the SPECS Approach.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

On the Next Generations of Infrastructure-as-a-Services.
Proceedings of the CLOSER 2016, 2016

Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study.
Proceedings of the CLOSER 2016, 2016

Methodology to Obtain the Security Controls in Multi-cloud Applications.
Proceedings of the CLOSER 2016, 2016

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016

2015
Stealthy Denial of Service Strategy in Cloud Computing.
IEEE Trans. Cloud Comput., 2015

Early Prediction of the Cost of Cloud Usage for HPC Applications.
Scalable Comput. Pract. Exp., 2015

Performance prediction of cloud applications through benchmarking and simulation.
Int. J. Comput. Sci. Eng., 2015

Prediction of cost and performance of cloud applications.
Int. J. Cloud Comput., 2015

Planting parallel program simulation on the cloud.
Concurr. Comput. Pract. Exp., 2015

REST-Based SLA Management for Cloud Applications.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

SLA-Based Secure Cloud Application Development: The SPECS Framework.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications.
Proceedings of the CLOSER 2015, 2015

Security Monitoring in the Cloud: An SLA-Based Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

DoS Protection in the Cloud through the SPECS Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
Developing Secure Cloud Applications.
Scalable Comput. Pract. Exp., 2014

SLA-based negotiation and brokering of cloud resources.
Int. J. Cloud Comput., 2014

An SLA-based brokering platform to provide sensor networks as-a-service.
Int. J. Bus. Process. Integr. Manag., 2014

Cloud-Aware Development of Scientific Applications.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Early Prediction of the Cost of HPC Application Execution in the Cloud.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

A Portable Tool for Running MPI Applications in the Cloud.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Cloud Application for Security Service Level Agreement Evaluation.
Proceedings of the CLOSER 2014, 2014

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud.
Proceedings of the CLOSER 2014, 2014

On the Adoption of Security SLAs in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks.
Scalable Comput. Pract. Exp., 2013

Experiences in building a mOSAIC of clouds.
J. Cloud Comput., 2013

Concurrent simulation in the cloud with the mJADES framework.
Int. J. Simul. Process. Model., 2013

An SLA-based Broker for Cloud Infrastructures.
J. Grid Comput., 2013

The CloudGrid approach: Security analysis and performance evaluation.
Future Gener. Comput. Syst., 2013

Cost/Performance Evaluation for Cloud Applications Using Simulation.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

An SLA-Based Approach to Manage Sensor Networks as-a-Service.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proceedings of the CLOSER 2013, 2013

A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs.
Int. J. Adapt. Resilient Auton. Syst., 2012

Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs.
Proceedings of the 21st IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2012

Benchmarks in the Cloud: The mOSAIC Benchmarking Framework.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

Process-oriented Discrete-event Simulation in Java with Continuations - Quantitative Performance Evaluation.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Intrusion Tolerance of Stealth DoS Attacks to Web Services.
Proceedings of the Information Security and Privacy Research, 2012

Simulation-Based Performance Evaluation of Cloud Applications.
Proceedings of the Intelligent Distributed Computing VI - Proceedings of the 6th International Symposium on Intelligent Distributed Computing, 2012

Negotiation Policies for Provisioning of Cloud Resources.
Proceedings of the ICAART 2012 - Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Volume 2, 2012

Intrusion Tolerance as a Service - A SLA-based Solution.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

SLA-Oriented Security Provisioning for Cloud Computing.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

SLA Negotiation and Brokering for Sky Computing.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

mJADES: Concurrent Simulation in the Cloud.
Proceedings of the Sixth International Conference on Complex, 2012

Intrusion Tolerance in Cloud Applications: The mOSAIC Approach.
Proceedings of the Sixth International Conference on Complex, 2012

Ontology-based Negotiation of security requirements in cloud.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

An intrusion detection framework for supporting SLA assessment in Cloud Computing.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
CHASE: An Autonomic Service Engine for Cloud Environments.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Building an interoperability API for Sky computing.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

User Centric Service Level Management in mOSAIC Applications.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

Enhancing an Autonomic Cloud Architecture with Mobile Agents.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

QoS Management in Cloud@Home Infrastructures.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Cloud Application Monitoring: The mOSAIC Approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards a Cross Platform Cloud API - Components for Cloud Federation.
Proceedings of the CLOSER 2011, 2011

The Cloud@Home Architecture - Building a Cloud Infrastructure from Volunteered Resources.
Proceedings of the CLOSER 2011, 2011

Intrusion Tolerant Approach for Denial of Service Attacks to Web Services.
Proceedings of the First International Conference on Data Compression, 2011

A SLA-based interface for security management in cloud and GRID integrations.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Access Control in Cloud-on-Grid Systems: The <i>PerfCloud</i> Case Study.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
Web Services Resilience Evaluation using LDS Load dependent Server Models..
J. Commun., 2010

An interoperability system for authentication and authorisation in VANETs.
Int. J. Auton. Adapt. Commun. Syst., 2010

A Service for Virtual Cluster Performance Evaluation.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Architecturing a Sky Computing Platform.
Proceedings of the Towards a Service-Based Internet. ServiceWave 2010 Workshops, 2010

A Cloud Agency for SLA Negotiation and Management.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Security and Performance Trade-off in PerfCloud.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Cloud@Home: Performance Management Components.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

The Cloud@Home Project: Towards a New Enhanced Computing Paradigm.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Instantaneous Load Dependent Servers (iLDS) Model for Web Services.
Proceedings of the CISIS 2010, 2010

Autonomic Composite-service Architecture with MAWeS.
Proceedings of the CISIS 2010, 2010

Cloud Agency: A Mobile Agent Based Cloud System.
Proceedings of the CISIS 2010, 2010

Identity federation in cloud computing.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

PerfCloud: Performance-Oriented Integration of Cloud and GRID.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
Simulation-based optimization of multiple-task GRID applications.
Future Gener. Comput. Syst., 2008

Self-optimization of secure web services.
Comput. Commun., 2008

2007
Cluster systems and simulation: from benchmarking to off-line performance prediction.
Concurr. Comput. Pract. Exp., 2007

A Framework for Mobile Agent Platform performance Evaluation.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Optimizing secure Web Services with MAWeS: A case study.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Building Autonomic and Secure Service Oriented Architectures with MAWeS.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A SLA evaluation methodology in Service Oriented Architectures.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006

Mobile Agents Self-optimization with MAWeS.
Proceedings of the Applied Parallel Computing. State of the Art in Scientific Computing, 2006

Self-optimization of MPI Applications Within an Autonomic Framework.
Proceedings of the High Performance Computing and Communications, 2006

Autonomic Web Service Development with MAWeS.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Performance prediction through simulation of a hybrid MPI/OpenMP application.
Parallel Comput., 2005

A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques.
J. Univers. Comput. Sci., 2005

Performance-Driven Development of a Web Services Application using MetaPL/HeSSE.
Proceedings of the 13th Euromicro Workshop on Parallel, 2005

Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A Simulation-Based Framework for Autonomic Web Services.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Self-optimizing MPI Applications: A Simulation-Based Approach.
Proceedings of the High Performance Computing and Communications, 2005

An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.
Proceedings of the Public Key Infrastructure, 2005

2004
A Performance-Oriented Technique for Hybrid Application Development.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2004

Performance Oriented Development and Tuning of GRID Applications.
Proceedings of the Applied Parallel Computing, 2004

Security Level Evaluation: Policy and Fuzzy Techniques.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure.
Proceedings of the ICETE 2004, 2004

2003
Integrated Tools for Performance-Oriented Distributed Software Development.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface,10th European PVM/MPI Users' Group Meeting, Venice, Italy, September 29, 2003

Performance Modeling of Scientific Applications: Scalability Analysis of LAPW0.
Proceedings of the 11th Euromicro Workshop on Parallel, 2003

Performance Simulation of a Hybrid OpenMP/MPI Application with HeSSE.
Proceedings of the Parallel Computing: Software Technology, 2003

2002
The metaPL approach to the performance analysis of distributed software systems.
Proceedings of the Third International Workshop on Software and Performance, 2002

2001
Adding Dynamic Coscheduling Support to PVM.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001

MetaPL: A Notation System for Parallel Program Description and Performance Analysis.
Proceedings of the Parallel Computing Technologies, 2001

2000
The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000

1996
Concept of the simulation environment for prototyping design of fault detection and diagnostic systems.
Simul. Pract. Theory, 1996


  Loading...