Recovering from Malicious Attacks in Workflow Systems

Author(s):  
Yajie Zhu ◽  
Tai Xin ◽  
Indrakshi Ray
2005 ◽  
Vol 34 (3) ◽  
pp. 44-49 ◽  
Author(s):  
Jia Yu ◽  
Rajkumar Buyya

IET Software ◽  
2008 ◽  
Vol 2 (5) ◽  
pp. 461 ◽  
Author(s):  
Y. Lu ◽  
L. Zhang ◽  
J. Sun

2021 ◽  
Author(s):  
Yuan Wang ◽  
Hideaki Ishii ◽  
Francois Bonnet ◽  
Xavier Defago
Keyword(s):  

Author(s):  
Chengwei Wu ◽  
Weiran Yao ◽  
Wei Pan ◽  
Guanghui Sun ◽  
Jianxing Liu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document