Massimiliano Rak

According to our database1, Massimiliano Rak
  • authored at least 124 papers between 1996 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Automatically Enforcing Security SLAs in the Cloud.
IEEE Trans. Services Computing, 2017

SLAs for cloud applications: agreement protocol and REST-based implementation.
IJGUC, 2017

MUSA Deployer: Deployment of Multi-cloud Applications.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Secure microGRID in Cloud: The CoSSMic Case Study.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Security Assurance of (Multi-)Cloud Application with Security SLA Composition.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Dynamic security assurance in multi-cloud DevOps.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

An Automatic Tool for Benchmark Testing of Cloud Applications.
Proceedings of the CLOSER 2017, 2017

A Security Metric Catalogue for Cloud Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
SLA-based Secure Cloud Application Development.
Scalable Computing: Practice and Experience, 2016

A framework for cloud-aware development of bag-of-tasks scientific applications.
IJGUC, 2016

Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications.
ERCIM News, 2016

Per-Service Security SLa: A New Model for Security Management in Clouds.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Cloud Security: From Per-Provider to Per-Service Security SLAs.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Cloud Challenges towards Free Flow of Data.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Towards a Proof-based SLA Management Framework - The SPECS Approach.
Proceedings of the CLOSER 2016, 2016

Security SLA in Next Generation Data Centers, the SPECS Approach.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

On the Next Generations of Infrastructure-as-a-Services.
Proceedings of the CLOSER 2016, 2016

Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study.
Proceedings of the CLOSER 2016, 2016

Methodology to Obtain the Security Controls in Multi-cloud Applications.
Proceedings of the CLOSER 2016, 2016

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016

2015
Stealthy Denial of Service Strategy in Cloud Computing.
IEEE Trans. Cloud Computing, 2015

Early Prediction of the Cost of Cloud Usage for HPC Applications.
Scalable Computing: Practice and Experience, 2015

Performance prediction of cloud applications through benchmarking and simulation.
IJCSE, 2015

Prediction of cost and performance of cloud applications.
IJCC, 2015

Planting parallel program simulation on the cloud.
Concurrency and Computation: Practice and Experience, 2015

REST-Based SLA Management for Cloud Applications.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

SLA-Based Secure Cloud Application Development: The SPECS Framework.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications.
Proceedings of the CLOSER 2015, 2015

Security Monitoring in the Cloud: An SLA-Based Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

DoS Protection in the Cloud through the SPECS Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
Developing Secure Cloud Applications.
Scalable Computing: Practice and Experience, 2014

SLA-based negotiation and brokering of cloud resources.
IJCC, 2014

An SLA-based brokering platform to provide sensor networks as-a-service.
IJBPIM, 2014

Cloud-Aware Development of Scientific Applications.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Early Prediction of the Cost of HPC Application Execution in the Cloud.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

A Portable Tool for Running MPI Applications in the Cloud.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Cloud Application for Security Service Level Agreement Evaluation.
Proceedings of the CLOSER 2014, 2014

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud.
Proceedings of the CLOSER 2014, 2014

On the Adoption of Security SLAs in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
The mOSAIC Benchmarking Framework: Development and Execution of Custom Cloud Benchmarks.
Scalable Computing: Practice and Experience, 2013

Experiences in building a mOSAIC of clouds.
J. Cloud Computing, 2013

Concurrent simulation in the cloud with the mJADES framework.
IJSPM, 2013

An SLA-based Broker for Cloud Infrastructures.
J. Grid Comput., 2013

The CloudGrid approach: Security analysis and performance evaluation.
Future Generation Comp. Syst., 2013

Cost/Performance Evaluation for Cloud Applications Using Simulation.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

An SLA-Based Approach to Manage Sensor Networks as-a-Service.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proceedings of the CLOSER 2013, 2013

A Proposal of a Simulation-Based Approach for Service Level Agreement in Cloud.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs.
IJARAS, 2012

Cloud-Based Concurrent Simulation at Work: Fast Performance Prediction of Parallel Programs.
Proceedings of the 21st IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2012

Benchmarks in the Cloud: The mOSAIC Benchmarking Framework.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

Process-oriented Discrete-event Simulation in Java with Continuations - Quantitative Performance Evaluation.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Intrusion Tolerance of Stealth DoS Attacks to Web Services.
Proceedings of the Information Security and Privacy Research, 2012

Simulation-Based Performance Evaluation of Cloud Applications.
Proceedings of the Intelligent Distributed Computing VI - Proceedings of the 6th International Symposium on Intelligent Distributed Computing, 2012

Negotiation Policies for Provisioning of Cloud Resources.
Proceedings of the ICAART 2012 - Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Volume 2, 2012

Intrusion Tolerance as a Service - A SLA-based Solution.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

SLA-Oriented Security Provisioning for Cloud Computing.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

SLA Negotiation and Brokering for Sky Computing.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

mJADES: Concurrent Simulation in the Cloud.
Proceedings of the Sixth International Conference on Complex, 2012

Intrusion Tolerance in Cloud Applications: The mOSAIC Approach.
Proceedings of the Sixth International Conference on Complex, 2012

Ontology-based Negotiation of security requirements in cloud.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

An intrusion detection framework for supporting SLA assessment in Cloud Computing.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
CHASE: An Autonomic Service Engine for Cloud Environments.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Building an interoperability API for Sky computing.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

User Centric Service Level Management in mOSAIC Applications.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

Enhancing an Autonomic Cloud Architecture with Mobile Agents.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

QoS Management in Cloud@Home Infrastructures.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Cloud Application Monitoring: The mOSAIC Approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards a Cross Platform Cloud API - Components for Cloud Federation.
Proceedings of the CLOSER 2011, 2011

The Cloud@Home Architecture - Building a Cloud Infrastructure from Volunteered Resources.
Proceedings of the CLOSER 2011, 2011

Intrusion Tolerant Approach for Denial of Service Attacks to Web Services.
Proceedings of the First International Conference on Data Compression, 2011

A SLA-based interface for security management in cloud and GRID integrations.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
Web Services Resilience Evaluation using LDS Load dependent Server Models..
JCM, 2010

An interoperability system for authentication and authorisation in VANETs.
IJAACS, 2010

A Service for Virtual Cluster Performance Evaluation.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Architecturing a Sky Computing Platform.
Proceedings of the Towards a Service-Based Internet. ServiceWave 2010 Workshops, 2010

A Cloud Agency for SLA Negotiation and Management.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Security and Performance Trade-off in PerfCloud.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Cloud@Home: Performance Management Components.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

The Cloud@Home Project: Towards a New Enhanced Computing Paradigm.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

Instantaneous Load Dependent Servers (iLDS) Model for Web Services.
Proceedings of the CISIS 2010, 2010

Autonomic Composite-service Architecture with MAWeS.
Proceedings of the CISIS 2010, 2010

Cloud Agency: A Mobile Agent Based Cloud System.
Proceedings of the CISIS 2010, 2010

Identity federation in cloud computing.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

PerfCloud: Performance-Oriented Integration of Cloud and GRID.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
Simulation-based optimization of multiple-task GRID applications.
Future Generation Comp. Syst., 2008

Self-optimization of secure web services.
Computer Communications, 2008

2007
Cluster systems and simulation: from benchmarking to off-line performance prediction.
Concurrency and Computation: Practice and Experience, 2007

A Framework for Mobile Agent Platform performance Evaluation.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Optimizing secure Web Services with MAWeS: A case study.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Building Autonomic and Secure Service Oriented Architectures with MAWeS.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A SLA evaluation methodology in Service Oriented Architectures.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006

Mobile Agents Self-optimization with MAWeS.
Proceedings of the Applied Parallel Computing. State of the Art in Scientific Computing, 2006

Self-optimization of MPI Applications Within an Autonomic Framework.
Proceedings of the High Performance Computing and Communications, 2006

Autonomic Web Service Development with MAWeS.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Performance prediction through simulation of a hybrid MPI/OpenMP application.
Parallel Computing, 2005

A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques.
J. UCS, 2005

Performance-Driven Development of a Web Services Application using MetaPL/HeSSE.
Proceedings of the 13th Euromicro Workshop on Parallel, 2005

Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A Simulation-Based Framework for Autonomic Web Services.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Self-optimizing MPI Applications: A Simulation-Based Approach.
Proceedings of the High Performance Computing and Communications, 2005

An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.
Proceedings of the Public Key Infrastructure, 2005

2004
A Performance-Oriented Technique for Hybrid Application Development.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2004

Performance Oriented Development and Tuning of GRID Applications.
Proceedings of the Applied Parallel Computing, 2004

Security Level Evaluation: Policy and Fuzzy Techniques.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure.
Proceedings of the ICETE 2004, 2004

2003
Integrated Tools for Performance-Oriented Distributed Software Development.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Off-Line Performance Prediction of Message-Passing Applications on Cluster Systems.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface,10th European PVM/MPI Users' Group Meeting, Venice, Italy, September 29, 2003

Performance Modeling of Scientific Applications: Scalability Analysis of LAPW0.
Proceedings of the 11th Euromicro Workshop on Parallel, 2003

Performance Simulation of a Hybrid OpenMP/MPI Application with HeSSE.
Proceedings of the Parallel Computing: Software Technology, 2003

2002
The metaPL approach to the performance analysis of distributed software systems.
Workshop on Software and Performance, 2002

2001
Adding Dynamic Coscheduling Support to PVM.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001

MetaPL: A Notation System for Parallel Program Description and Performance Analysis.
Proceedings of the Parallel Computing Technologies, 2001

2000
The Transition from a PVM Program Simulator to a Heterogeneous System Simulator: The HeSSE Project.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000

1996
Concept of the simulation environment for prototyping design of fault detection and diagnostic systems.
Simul. Pr. Theory, 1996


  Loading...