default search action
Elio Goettelmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j2]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann, Roel J. Wieringa:
An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3): 2285-2312 (2019) - 2018
- [j1]Amina Ahmed Nacer, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, Claude Godart:
A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation. Int. J. Web Serv. Res. 15(4): 61-81 (2018) - 2017
- [i1]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF. CoRR abs/1701.01664 (2017) - 2016
- [c11]Amina Ahmed Nacer, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, Claude Godart:
Obfuscating a Business Process by Splitting Its Logic with Fake Fragments for Securing a Multi-cloud Deployment. SERVICES 2016: 18-25 - 2015
- [b1]Elio Goettelmann:
Risk-aware Business Process Modelling and Trusted Deployment in the Cloud. (Modélisation de processus métiers sensibilisés aux risques et déploiement en confiance dans le cloud). University of Lorraine, Nancy, France, 2015 - [c10]Nicolas Mayer, Eric Grandry, Christophe Feltus, Elio Goettelmann:
Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures. CAiSE Workshops 2015: 459-469 - [c9]Elio Goettelmann, Amina Ahmed Nacer, Samir Youcef, Claude Godart:
Paving the Way towards Semi-automatic Design-Time Business Process Model Obfuscation. ICWS 2015: 559-566 - [c8]Amina Ahmed Nacer, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, Claude Godart:
Business Process Design by Reusing Business Process Fragments from the Cloud. SOCA 2015: 193-200 - [c7]Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, Claude Godart:
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms. TrustCom/BigDataSE/ISPA (1) 2015: 864-871 - 2014
- [c6]Elio Goettelmann, Karim Dahman, Benjamin Gâteau, Eric Dubois, Claude Godart:
A Security Risk Assessment Model for Business Process Deployment in the Cloud. IEEE SCC 2014: 307-314 - [c5]Elio Goettelmann, Karim Dahman, Benjamin Gâteau, Claude Godart:
A Formal Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds. CAiSE Forum (Selected Extended Papers) 2014: 3-19 - [c4]Elio Goettelmann, Karim Dahman, Benjamin Gâteau, Claude Godart:
A Broker Framework for Secure and Cost-Effective Business Process Deployment on Multiple Clouds. CAiSE (Forum/Doctoral Consortium) 2014: 49-56 - [c3]Elio Goettelmann, Nicolas Mayer, Claude Godart:
Integrating Security Risk Management into Business Process Management for the Cloud. CBI (1) 2014: 86-93 - 2013
- [c2]Elio Goettelmann, Walid Fdhila, Claude Godart:
Partitioning and Cloud Deployment of Composite Web Services under Security Constraints. IC2E 2013: 193-200 - [c1]Elio Goettelmann, Nicolas Mayer, Claude Godart:
A general approach for a trusted deployment of a business process in clouds. MEDES 2013: 92-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint