Author of the publication

Sedic: privacy-aware data intensive computing on hybrid clouds.

, , , , and . ACM Conference on Computer and Communications Security, page 515-526. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight searchable screen video recording., , and . VCIP, page 1-6. IEEE, (2012)Measuring enterprise network usage pattern & deploying passive optical LANs., , , , , , and . IM, page 890-893. IEEE, (2015)Integrated user activity monitoring for regulatory services., , , , , , , and . NOMS, page 750-763. IEEE, (2012)The origins of network server latency & the myth of connection scheduling., and . SIGMETRICS, page 424-425. ACM, (2004)How DNS Misnaming Distorts Internet Topology Mapping., , , and . USENIX Annual Technical Conference, General Track, page 369-374. USENIX, (2006)Understanding and Addressing Blocking-Induced Network Server Latency., and . USENIX Annual Technical Conference, General Track, page 143-156. USENIX, (2006)Are clouds ready for large distributed applications?, , , , and . ACM SIGOPS Oper. Syst. Rev., 44 (2): 18-23 (2010)Sedic: privacy-aware data intensive computing on hybrid clouds., , , , and . ACM Conference on Computer and Communications Security, page 515-526. ACM, (2011)Building end-to-end management analytics for enterprise data centers., , , , , and . Integrated Network Management, page 661-675. IEEE, (2009)Splitter: a proxy-based approach for post-migration testing of web applications., , , , , and . EuroSys, page 97-110. ACM, (2010)