Author of the publication

Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper).

, , , , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 293-312. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper)., , , , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 293-312. Springer, (2010)Identification of Patient Prescribing Predicting Cancer Diagnosis Using Boosted Decision Trees., , , , , , , , , and 1 other author(s). AIME, volume 11526 of Lecture Notes in Computer Science, page 328-333. Springer, (2019)Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications., and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 3-4. Springer, (2006)Traceability and Timeliness in Messaging Middleware., and . OTM Workshops (2), volume 4278 of Lecture Notes in Computer Science, page 1551-1554. Springer, (2006)Trust for Ubiquitous, Transparent Collaboration., , and . Wireless Networks, 10 (6): 711-721 (2004)Trust for Ubiquitous, Transparent Collaboration., , and . PerCom, page 153-160. IEEE Computer Society, (2003)Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control., and . WPES, page 20-26. ACM, (2005)A Framework for Event Composition in Distributed Systems., , and . Middleware, volume 2672 of Lecture Notes in Computer Science, page 62-82. Springer, (2003)FlowR: aspect oriented programming for information flow control in ruby., , and . MODULARITY, page 37-48. ACM, (2014)Policies in Accountable Contracts., and . POLICY, page 80-91. IEEE Computer Society, (2002)