Author of the publication

TEADAL: Trustworthy, Energy-Aware federated DAta Lakes along the computing continuum.

, , , , , , and . CAiSE Research Projects Exhibition, volume 3413 of CEUR Workshop Proceedings, page 28-35. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pick your choice in HBase: Security or performance., , and . IEEE BigData, page 548-554. IEEE Computer Society, (2016)Modellierung rechtskonformer kollaborativer Bereitstellung von Regelenergie im SmartGrid., , and . GI Jahrestagung (1), volume P-175 of LNI, page 443-448. GI, (2010)TILT: A GDPR-Aligned Transparency Information Language and Toolkit for Practical Privacy Engineering., and . FAccT, page 636-646. ACM, (2021)Hawk: DevOps-driven Transparency and Accountability in Cloud Native Systems., , , and . CLOUD, page 167-174. IEEE, (2023)Diminuendo! Tactics in Support of FaaS Migrations., , , , , , , and . XP Workshops, volume 396 of Lecture Notes in Business Information Processing, page 125-132. Springer, (2020)Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud., , , , and . FiCloud, page 1-8. IEEE Computer Society, (2015)Sicherheit und rechtliche Herausforderungen in Bezug auf Cloud Computing und Kritische Infrastruktur-IT., , and . Elektrotech. Informationstechnik, 131 (1): 33-36 (2014)YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios., and . DPM/CBT@ESORICS, volume 11025 of Lecture Notes in Computer Science, page 329-344. Springer, (2018)Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes., and . TrustBus, volume 11033 of Lecture Notes in Computer Science, page 39-54. Springer, (2018)RedCASTLE: practically applicable ks-anonymity for IoT streaming data at the edge in node-RED., , , and . M4IoT@Middleware, page 8-13. ACM, (2021)