Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds., , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 963-972 (2013)Taxonomy and Requirements Rationalization for Infrastructure in Cloud-based Software Testing., and . CloudCom, page 454-461. IEEE Computer Society, (2011)Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension., , , and . SAINT Workshops, page 696-701. IEEE Computer Society, (2004)Extensible Security Patterns.. DEXA Workshops, page 729-733. IEEE Computer Society, (2007)Revisiting the Firewall Abolition Act., and . HICSS, page 206. IEEE Computer Society, (2003)Security Controls in Collaborative Business Processes., , and . PRO-VE, volume 186 of IFIP, page 247-254. Springer, (2005)POSSET - Policy-Driven Secure Session Transfer., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 13-24. Springer, (2005)Service level management convergence for future network enterprise platforms., , and . Future Network & Mobile Summit, page 1-9. IEEE, (2012)The GEYSERS optical testbed: A platform for the integration, validation and demonstration of cloud-based infrastructure services., , , , , , , , , and 15 other author(s). Comput. Networks, (2014)Dynamic virtual organization management for service oriented enterprise applications., , and . CollaborateCom, IEEE Computer Society / ICST, (2005)