Author of the publication

PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain.

, , , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralised provenance for healthcare data., , , , and . Int. J. Medical Informatics, (2020)PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain., , , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Differentially Private Data Sharing in a Cloud Federation with Blockchain., , , and . IEEE Cloud Comput., 5 (6): 69-79 (2018)A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies., , , and . IEEE Trans. Software Eng., 45 (1): 2-33 (2019)Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case., , , , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Riskio: A Serious Game for Cyber Security Awareness and Education., , , and . Comput. Secur., (2020)A Formal Approach to Specification, Analysis and Implementation of Policy-Based Systems.. University of Pisa, Italy, (2016)On Programming and Policing Autonomic Computing Systems., , , and . ISoLA (1), volume 8802 of Lecture Notes in Computer Science, page 164-183. Springer, (2014)Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - - A Practical Approach -., , , and . WS-FM, volume 8379 of Lecture Notes in Computer Science, page 85-105. Springer, (2013)Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments., , , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 146-155. CEUR-WS.org, (2017)