Author of the publication

Secure processing of large scale databases in a cloud computing environment.

, , , and . AICCSA, page 1-4. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed RFID Multi-Agent System for Healthcare Hospitals., , and . EDA, volume B-14 of RNTI, page 291-302. Éditions RNTI, (2018)A multi-tiered system for querying the web of data., , , and . EDA, volume B-14 of RNTI, page 121-132. Éditions RNTI, (2018)Mobile cloud computing: Current development and research challenges., , , and . AICCSA, page 1. IEEE Computer Society, (2013)Communities Identification Using Nodes Features., , , and . ISMIS, volume 9384 of Lecture Notes in Computer Science, page 303-312. Springer, (2015)Dynamic management of data warehouse security levels based on user profiles., , , and . CIST, page 59-64. IEEE, (2016)Process Mining towards Big data analytics in logistics environments: RORO Terminals., , and . EDA, volume B-14 of RNTI, page 331-332. Éditions RNTI, (2018)Intermediate results processing for aggregated SPARQL queries., , , and . AICCSA, page 1-8. IEEE, (2021)Towards a UML Profile for Designing Smart IoT Data-Centric Applications., , , , , , and . CAiSE Forum, volume 477 of Lecture Notes in Business Information Processing, page 9-16. Springer, (2023)Towards Data Warehouses for Natural Hazards., , and . ICEIS (1), page 415-419. (2005)An User-centric and Semantic-driven Query Rewriting over Proteomics XML Sources., , and . ICEIS (1), page 123-130. (2009)