Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds., , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 963-972 (2013)Taxonomy and Requirements Rationalization for Infrastructure in Cloud-based Software Testing., and . CloudCom, page 454-461. IEEE Computer Society, (2011)Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension., , , and . SAINT Workshops, page 696-701. IEEE Computer Society, (2004)POSSET - Policy-Driven Secure Session Transfer., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 13-24. Springer, (2005)Security Controls in Collaborative Business Processes., , and . PRO-VE, volume 186 of IFIP, page 247-254. Springer, (2005)Service level management convergence for future network enterprise platforms., , and . Future Network & Mobile Summit, page 1-9. IEEE, (2012)Revisiting the Firewall Abolition Act., and . HICSS, page 206. IEEE Computer Society, (2003)Extensible Security Patterns.. DEXA Workshops, page 729-733. IEEE Computer Society, (2007)Bayesian characterization of multiple-slope sound energy decay in coupled-volume systems, , , and . Journal of the Acoustical Society of America, 129 (2): 741--752 (February 2011)Security and Trust in IT Business Outsourcing: a Manifesto., , , , and . STM, volume 179 of Electronic Notes in Theoretical Computer Science, page 47-58. Elsevier, (2006)