Author of the publication

Challenges for trustworthy (multi-) Cloud based services in the Challenges for trustworthy (multi-)Cloud- based services in the Digital Single Market

, , , , , , , , , , , , , , , , , , , and . Cluster of European Projects on Clouds: Data Protection, Security and Privacy in the Cloud, (January 2016)
DOI: 10.13140/RG.2.2.16324.63362

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handbook on Statistical Disclosure Control (Version 1.1). ESSNET SDC Project, , , , , , , , and . (2009)Statistical Databases.. Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics., , , , , and . CoRR, (2015)FuturICT - The Road towards Ethical ICT, , , , , and . CoRR, (2012)Big Data Anonymization Requirements vs Privacy Models.. ICETE (2), page 471-478. SciTePress, (2018)Software Run-Time Protection: A Cryptographic Issue.. EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 474-480. Springer, (1990)General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model., , and . CoRR, (2020)Practical Data-Oriented Microaggregation for Statistical Disclosure Control., and . IEEE Trans. Knowl. Data Eng., 14 (1): 189-201 (2002)Dynamic group size accreditation and group discounts preserving anonymity., , and . Int. J. Inf. Sec., 17 (3): 243-260 (2018)Decapitation of networks with and without weights and direction: The economics of iterated attack and defense., and . Comput. Networks, 55 (1): 119-130 (2011)