Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Programming trustworthy Infrastructure As Code in a sEcuRE framework

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

PIACERE IDE - v3 (opens in new window)

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

PIACERE IDE - v2 (opens in new window)

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

IaC Code Security and components security Inspection - v1 (opens in new window)

These deliverables will present the outcome of Task T42 and Task T43 Each deliverable will comprise both a software prototype KR6KR7 and a Technical Specification Report The document will include the Security Inspector technical design and implementation aspects The document will also include the Security Inspector technical design and implementation aspects

Canary environment prototype - v3 (opens in new window)

The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.

IaC execution platform prototype - v2 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

IaC execution platform prototype - v1 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

IaC execution platform prototype - v3 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

PIACERE run-time monitoring and self-learning, self-healing platform - v2 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

PIACERE DevSecOps Framework - v1 (opens in new window)

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach The first version will be an initial prototype with the core functionalities implemented the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases The software will be accompanied by a Technical Specification Report When appropriate the architecture definition of the DevSecOps framework will be updated

PIACERE run-time monitoring and self-learning, self-healing platform - v1 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

PIACERE DevSecOps Framework - v3 (opens in new window)

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated

IaC Code Security and components security Inspection - v3 (opens in new window)

These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.

Infrastructural code generation - v1 (opens in new window)

These deliverables will present the outcome of Task T34 Each deliverable will comprise both a software prototype KR3 and a Technical Specification Report The document will include the ICG technical design and will report related research results

PIACERE Abstractions, DOML and DOML-E - v3 (opens in new window)

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

IOP prototype - v2 (opens in new window)

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

IOP prototype - v3 (opens in new window)

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

PIACERE run-time monitoring and self-learning, self-healing platform - v3 (opens in new window)

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

Infrastructural model and code verification - v3 (opens in new window)

These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.

PIACERE Abstractions, DOML and DOML-E - v1 (opens in new window)

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

Canary environment prototype - v2 (opens in new window)

The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.

PIACERE IDE - v1 (opens in new window)

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

IaC Code Security and components security Inspection - v2 (opens in new window)

These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.

Infrastructural model and code verification - v1 (opens in new window)

These deliverables will present the outcome of Task T41 Each deliverable will comprise both a software prototype KR5 and a Technical Specification Report The document will include the VT technical design and will report related research results

PIACERE Abstractions, DOML and DOML-E - v2 (opens in new window)

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

IOP prototype - v1 (opens in new window)

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

PIACERE DevSecOps Framework - v2 (opens in new window)

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated

Infrastructural code generation - v2 (opens in new window)

These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.

Canary environment prototype - v1 (opens in new window)

The main outcomes of T52 from M1 to M30 will be presented in these deliverables Each deliverable will have a Technical Specification Report and a software prototype KR8 These deliverables will also contain a scientific report on behaviour verification and antipattern detection methodologies

Infrastructural model and code verification - v2 (opens in new window)

These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.

Infrastructural code generation - v3 (opens in new window)

These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.

Dissemination, communication and networking report - Report - v1 (opens in new window)

This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update projects dissemination and communication plan respectively This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE as well as future networking plans

PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v2 (opens in new window)

This deliverable is the result of Task 2.1, Task 2.2. and Task 2.3. This document will contain 1) all the functional, non-functional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs (WP3, WP4, WP5 and WP6). This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 (D7.1). 2) the architecture of the DevSecOps framework [KR13] and the workflow, 3) the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution. This deliverable is the result of Task 2.1 and Task 2.3.

Communication, Networking Plan and Dissemination Strategy (opens in new window)

This deliverable has a threefold goal Firstly it will define the way in which the different communities scientific commercial general public will be targeted as well as the social media will be used Secondly it will detail the specific plan for networking activities with external entities including the specific working group this project will participate Finally it will describe the project dissemination strategy to be adopted throughout the project lifetime The release of the respective report is considered one of the key milestones of the project

Dissemination, communication and networking report - Report - v2 (opens in new window)

This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update project’s dissemination and communication plan respectively. This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE, as well as future networking plans.

PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v1 (opens in new window)

This deliverable is the result of Task 21 Task 22 and Task 23 This document will contain 1 all the functional nonfunctional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs WP3 WP4 WP5 and WP6 This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 D71 2 the architecture of the DevSecOps framework KR13 and the workflow 3 the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution This deliverable is the result of Task 21 and Task 23

PIACERE brochure and public website (opens in new window)

The initial version of the brochure and project website will include at least project objectives and contact details PIACERE website will be setup by the Project Leader TECNALIA and continuously enhanced by all partners to include public downloadable results and links to related news and initiatives

Publications

ACSmI: A solution to address the challenges of Cloud services federation and monitoring towards the Cloud Continuum

Author(s): Juncal Alonso, Maider Huarte, Leire Orue-Echevarria
Published in: International Journal of Computational Science and Engineering (IJCSE), 2020, ISSN 1742-7185
Publisher: Inderscience Enterprises

CloudOps: Towards the Operationalization of the Cloud Continuum: Concepts, Challenges and a Reference Framework (opens in new window)

Author(s): Alonso, Juncal; Huarte, Maider; Orue-Echevarria, Leire
Published in: MDPI Applied Sciences, Issue 1, 2022, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app12094347

A dataset for mobile edge computing network topologies

Author(s): Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto
Published in: Data in Brief, Issue 39, 2021, ISSN 2352-3409
Publisher: Elsevier BV

Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review (opens in new window)

Author(s): Juncal Alonso; Leire Orue-Echevarria; Valentina Casola; Ana Isabel Torre; Maider Huarte; Eneko Osaba; Jesus L. Lobo
Published in: Journal of Cloud Computing, Issue 12, 2023, ISSN 2192-113X
Publisher: Springer Science + Business Media
DOI: 10.1186/s13677-022-00367-6

Joint Planning of Network Slicing and Mobile Edge Computing: Models and Algorithms. (opens in new window)

Author(s): Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Published in: IEEE Transactions on Cloud Computing, Issue 11, 2021, Page(s) 620-638, ISSN 2168-7161
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/tcc.2021.3107022

Joint Planning of Network Slicing and Mobile Edge Computing: Models and Algorithms (opens in new window)

Author(s): Xiang, Bin; Elias, Jocelyne; Martignon, Fabio; Di Nitto, Elisabetta
Published in: IEEE Transactions on Cloud Computing, Issue 3, 2021, ISSN 2168-7161
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.5281/zenodo.5495727

Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum (opens in new window)

Author(s): Juncal Alonso; Leire Orue-Echevarria; Eneko Osaba; Jesus L. Lobo; Iñigo Martinez; Josu Diaz de Arcaya; Iñaki Etxaniz
Published in: Information 12(8), Issue 1, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12080308

Embracing IaC Through the DevSecOps Philosophy: Concepts, Challenges, and a Reference Framework

Author(s): Juncal Alonso; Radoslaw Piliszek; Matija Cankar
Published in: Special Issue on Infrastructure-as-Code Unleashed, 2021, ISSN 0740-7459
Publisher: Institute of Electrical and Electronics Engineers

A Model Checker for Operator Precedence Languages (opens in new window)

Author(s): Michele Chiari; Dino Mandrioli; Francesco Pontiggia; Matteo Pradella
Published in: ACM Transactions on Programming Languages and Systems, 2023, ISSN 0164-0925
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3608443

Resource calendaring for Mobile Edge Computing: Centralized and decentralized optimization approaches (opens in new window)

Author(s): Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Published in: Computer Networks, Issue 2, 2021, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.5281/zenodo.5495557

Challenges Towards Modeling and Generating Infrastructure-as-Code (opens in new window)

Author(s): Nedeltcheva, Galia Novakova, Bin Xiang, Laurentiu Niculut, and Debora Benedetto
Published in: FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 189-193
Publisher: ACM Digital Library
DOI: 10.1145/3578245.3584937

Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs (opens in new window)

Author(s): Antić, Jan, Joao Pita Costa, Aleš Černivec, Matija Cankar, Tomaž Martinčič, Aljaž Potočnik, Gorka Benguria Elguezabal, Nelly Leligou, and Ismael Torres Boigues.
Published in: 4th International Workshop on Information and Operational Technology Security (IOSEC 2023), 2023
Publisher: IEEE Xplore Digital Library
DOI: 10.1109/drcn57075.2023.10108105

IEM: A Unified Lifecycle Orchestrator for Multilingual IaC Deployments (opens in new window)

Author(s): Josu Diaz-de-Arcaya, Eneko Osaba, Gorka Benguria, Iñaki Etxaniz, Jesus L. Lobo, Juncal Alonso, Ana I. Torre-Bastida, Aitor Almeida
Published in: FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 195-197
Publisher: ACM Digital Library
DOI: 10.1145/3578245.3584938

On the Connection between Concept Drift and Uncertainty in Industrial Artificial Intelligence (opens in new window)

Author(s): López Lobo, Jesus; Laña, Ibai; Osaba, Eneko; Del Ser, Javier
Published in: IEEE Conference on Artificial Intelligence (IEEE CAI 2023), 2023
Publisher: IEEE
DOI: 10.1109/cai54212.2023.00081

PIACERE Project: Description and Prototype for Optimizing Infrastructure as Code Deployment Configurations (opens in new window)

Author(s): Osaba, E., Diaz-de-Arcaya, J., Orue-Echavarria, L., Alonso, J., López Lobo, J., Benguría G., & Etxaniz I.
Published in: Proceedings of the the Genetic and Evolutionary Computation Conference (GECCO 2022), 2022, Page(s) 71-72
Publisher: ACM Digital Library
DOI: 10.1145/3520304.3533938

Developing a New DevOps Modelling Language to Support the Creation of Infrastructure as Code (opens in new window)

Author(s): Chiari, Michele; Di Nitto, Elisabetta; Noguero Mucientes, Adrián; Xiang, Bin
Published in: European Conference On Service-Oriented And Cloud Computing, Issue 1, 2022
Publisher: ESOCC
DOI: 10.5281/zenodo.6697369

Static Analysis of Infrastructure as Code: a Survey (opens in new window)

Author(s): Chiari, Michele; De Pascalis, Michele; Pradella, Matteo
Published in: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C 2022). First International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2022), 2022
Publisher: IEEE
DOI: 10.1109/icsa-c54293.2022.00049

PIACERE: Programming trustworthy Infrastructure as Code in a Secure Framework

Author(s): Juncal Alonso, Christophe Joubert, Leire Orue-Echevarria, Matteo Pradella and Daniel Vladušič
Published in: European Conference On Service-Oriented And Cloud Computing, 2021
Publisher: CEUR

PIACERE Integrated Development Environment (opens in new window)

Author(s): Eliseo Villanueva, Ismael Torres, Eneko Osaba, Sergio Canzoneri, Andrea Franchini, Lorenzo Blasi
Published in: Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum (eSAAM), 2023, Page(s) 62-66
Publisher: ACM Digital Library
DOI: 10.1145/3624486.3624507

Optimizing IaC Configurations: a Case Study Using Nature-inspired Computing

Author(s): Eneko Osaba, Gorka Benguria, Jesus L. Lobo, Josu Diaz-de-Arcaya, Juncal Alonso, Iñaki Etxaniz
Published in: The 6th International Conference on Computational Intelligence and Intelligent Systems (CIIS 2023), 2023
Publisher: ACM

Towards Supporting the Generation of Infrastructure as Code Through Modelling Approaches – Systematic Literature Review (opens in new window)

Author(s): Galia Nedeltcheva, Alfonso De La Fuente Ruiz, Leire Orue-Echevarria Arrieta, Nejc Bat, Lorenzo Blasi
Published in: IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 2022
Publisher: IEEE
DOI: 10.1109/icsa-c54293.2022.00048

Game theory strategies for Open-Source Infrastructure-as-Code (opens in new window)

Author(s): Alfonso de la Fuente Ruiz, Galia Novakova Nedeltcheva
Published in: IEEE 20th International Conference on Software Architecture Companion (ICSA-C 2023). Second International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2023), 2023
Publisher: IEEE Xplore Digital Library
DOI: 10.1109/icsa-c57050.2023.00075

Multiobjective Optimization Analysis for Finding Infrastructure-as-Code Deployment Configurations (opens in new window)

Author(s): Eneko Osaba; Josu Diaz-De-Arcaya; Juncal Alonso; Jesus L. Lobo; Gorka Benguria; Iñaki Etxaniz
Published in: Proceedings of the 1st International Conference on Computer and Communications Management (ICCCM 2023), 2023
Publisher: ACM
DOI: 10.1145/3617733.3617777

Security in DevSecOps: Applying tools and machine learning to verifications and monitoring steps (opens in new window)

Author(s): M. Cankar, N. Petrovic, J. Pita Costa, A. Cernivec, J. Antic, T. Martincic, D. Stepec. Security in DevSecOps
Published in: FASTContinuum 2023 workshop, co-located with the International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 201-205
Publisher: ACM Digital Library
DOI: 10.1145/3578245.3584943

An Evolutionary Computation based Platform for Optimizing Infrastructure-As-Code Deployment Configurations (opens in new window)

Author(s): Eneko Osaba, Josu Diaz-de-Arcaya, Juncal Alonso, Jesus L. Lobo, Gorka Benguria, Iñaki Etxaniz
Published in: Proceedings of the Eighth International Congress on Information and Communication Technology (ICICT 2023), 2023
Publisher: SpringerLink
DOI: 10.1007/978-981-99-3043-2_25

DOML - A New Modelling Approach To Infrastructure-as-Code (opens in new window)

Author(s): Michele Chiari, Bin Xiang, Galia Nedeltcheva, Elisabetta Di Nitto, Lorenzo Blasi, Debora Benedetto, Laurentiu Niculut
Published in: Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023
Publisher: Springer
DOI: 10.1007/978-3-031-34560-9_18

Automated Approach to IaC Code Inspection Using Python-Based DevSecOps Tool (opens in new window)

Author(s): Nenad Petrovic; Matija Cankar; Anze Luzar
Published in: Crossref, Issue 1, 2022
Publisher: IEEEXplore
DOI: 10.1109/telfor56187.2022.9983681

Developing a New DevOps Modelling Language to Support the Creation of Infrastructure as Code (opens in new window)

Author(s): Michele Chiari; Elisabetta Di Nitto; Adrián Noguero Mucientes; Bin Xiang
Published in: Proceedings of the European Conference on Service-Oriented and Cloud Computing (ESOCC 2022), 2022
Publisher: SpringerLink
DOI: 10.1007/978-3-031-23298-5_8

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0