On or Off the Blockchain? Insights on Off-Chaining Computation and Data.- Microservices and Containers.- Microservices Identification through Interface Analysis.- A Performance Survey of Lightweight Virtualization Techniques.- Low-level Exploitation Mitigation by Diverse Microservices.- Security.- A Formal Approach for the Verification of AWS IAM Access Control Policies.- Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments.- Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPSec Performance.- Cloud Resources.- Two are better than one: An algorithm portfolio approach to cloud resource management.- A Fuzzy Load Balancer for Adaptive Fault Tolerance Management in Cloud Platforms.- Data preparation as a service based on Apache Spark.- Services.- Human-in-the-Loop Simulation of Cloud Services.- Toward automatic semantic API descriptions to support services composition.- On Abstraction-based Deadlock-Analysis in Service-Oriented Systems with Recursion.- Internet of Things and Data Streams.- IoT-based Compliance Checking of Multi-party Business Processes modeled with Commitments.- Empowering Low-latency Applications through a Serverless Edge Computing Architecture.- Industrial Applications of Service and Cloud Computing.- uStorage – A storage architecture to provide Block-level Storage through Object-based Storage.- Heart Order Detection with Menard Algorithm on Apache Spark.<p></p>