Author of the publication

Disaster Recovery for Cloud-Hosted Enterprise Applications.

, , , and . CLOUD, page 432-439. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards automated provisioning of secure virtualized networks., , , and . ACM Conference on Computer and Communications Security, page 235-245. ACM, (2007)Automated Incident Management for a Platform-as-a-Service Cloud., , , , and . Hot-ICE, USENIX Association, (2011)Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System., , and . PRDC, page 9-18. IEEE Computer Society, (2002)Providing Resiliency to Orchestration and Automation Engines in Hybrid Cloud., , , and . DSN Workshops, page 125-128. IEEE Computer Society, (2017)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , and . LADC, volume 2847 of Lecture Notes in Computer Science, page 81-101. Springer, (2003)Group Communication Protocols and a Framework for Intrusion-Tolerant Distributed Applications.. IFIP Student Forum, page 93-104. Kluwer, (2004)Policy enforcement and compliance proofs for Xen virtual machines., , and . VEE, page 101-110. ACM, (2008)Experiences with Building Disaster Recovery for Enterprise-Class Clouds., , , , and . DSN, page 231-238. IEEE Computer Society, (2015)System Restore in a Multi-cloud Data Pipeline Platform., , , , , , , , , and 2 other author(s). DSN (Industry Track), page 21-24. IEEE, (2019)Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast., and . OPODIS, volume 3974 of Lecture Notes in Computer Science, page 88-102. Springer, (2005)