共 50 条
- [41] Towards Establishing Security-Aware Cloud Markets 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 1027 - 1032
- [42] SecCom: A Prototype for Integrating Security-Aware Components INFORMATION SYSTEMS: MODELING, DEVELOPMENT, AND INTEGRATION: THIRD INTERNATIONAL UNITED INFORMATION SYSTEMS CONFERENCE, UNISCON 2009, 2009, 20 : 393 - 403
- [43] A Comparative Analysis of Security Features and Concerns in NoSQL Databases FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 349 - 364
- [45] Querying in a Workload-Aware Triplestore Based on NoSQL Databases DATABASE AND EXPERT SYSTEMS APPLICATIONS, PT II, 2019, 11707 : 159 - 173
- [46] Automated Workload-aware Elasticity of NoSQL Clusters in the Cloud 2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014, : 195 - 200
- [47] On the Modeling and Verification of Security-Aware and Process-Aware Information Systems BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 423 - +
- [48] Building security-aware applications on Celestial network security management infrastructure IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 219 - 225
- [49] Developing security-aware resource management strategies for workflows FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 38 : 61 - 68
- [50] Towards Security-Aware Virtual Environments for Digital Twins CPSS'18: PROCEEDINGS OF THE 4TH ACM WORKSHOP ON CYBER-PHYSICAL SYSTEM SECURITY, 2018, : 61 - 72