Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Program analysis for secure big data processing., , , and . ASE, page 277-288. ACM, (2014)STYX: Stream Processing with Trustworthy Cloud-based Execution., , , , and . SoCC, page 348-360. ACM, (2016)Atmosphere: A Universal Cross-Cloud Communication Infrastructure., , and . Middleware, volume 8275 of Lecture Notes in Computer Science, page 163-182. Springer, (2013)Dependable Cloud Resources with Guardian., , , , and . ICDCS, page 1543-1554. IEEE Computer Society, (2017)Securing cloud-based data analytics: A practical approach. Purdue University, USA, (2016)Deep Enforcement: Policy-based Data Transformations for Data in the Cloud., , , , , , , , and . HotCloud, USENIX Association, (2019)Assured Cloud-Based Data Analysis with ClusterBFT., and . Middleware, volume 8275 of Lecture Notes in Computer Science, page 82-102. Springer, (2013)Secure data types: a simple abstraction for confidentiality-preserving data analytics., , , , and . SoCC, page 479-492. ACM, (2017)Practical Confidentiality Preserving Big Data Analysis., , , and . HotCloud, USENIX Association, (2014)Multi-Framework Reliability Approach., , , , and . IEEE Trans. Cloud Comput., 10 (4): 2750-2768 (2022)