Author of the publication

PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web.

, , and . Secure Data Management, volume 3178 of Lecture Notes in Computer Science, page 118-132. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework., and . ISI, volume 3975 of Lecture Notes in Computer Science, page 516-521. Springer, (2006)PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet., , and . CCS, page 210-219. ACM, (2000)Choices in database workstation-server architecture., and . COMPSAC, page 298-305. IEEE, (1993)The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance., , and . FAST, page 1-14. USENIX, (2009)Active buffering plus compressed migration: an integrated solution to parallel simulations' data transport needs., , , and . ICS, page 156-166. ACM, (2002)Tuning high-performance scientific codes: the use of performance models to control resource usage during data migration and I/O., , , and . ICS, page 181-195. ACM, (2001)David Lomet speaks out: on database recovery, logs, versions and more..., and . SIGMOD Record, 41 (1): 30-39 (2012)Yannis Ioannidis speaks out on database research funding in Europe, the importance of being uncertain, teaching as show business, the history of histograms, and more.. SIGMOD Record, 35 (4): 69-76 (2006)Christos Faloutsos speaks out: on power laws, fractals, the future of data mining, sabbaticals, and more.. SIGMOD Record, 34 (4): 85-89 (2005)Interview: C. Mohan Speaks Out., and . SIGMOD Record, 33 (4): 77-84 (2004)