Secure & Rapid Composition of Infrastructure Services in the Cloud
Secure Communication and Access Control for Mobile Web Service Provisioning
Secure Data Processing in a Hybrid Cloud
Secure Execution of Distributed Session Programs
Secure History Preservation Through Timeline Entanglement
Secure Position Verification for Wireless Sensor Networks in Noisy Channels
Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing
Secured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm
Securing business operations in an SOA
Security Aware Mobile Web Service Provisioning
Self-adaptive Gossip Policies for Distributed Population-based Algorithms
Self-Assembly as Graph Grammar as Distributed System
Self-healing using virtual structures
Self-Organising management of Grid environments
Self-Recovering Sensor-Actor Networks
Self-Repairing Codes for Distributed Storage - A Projective Geometric Construction
Self-repairing Homomorphic Codes for Distributed Storage Systems
Self-stabilization of Circular Arrays of Automata
Self-Stabilization, Byzantine Containment, and Maximizable Metrics: Necessary Conditions
Self-stabilizing Byzantine Agreement