Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Querying Encrypted XML Documents., and . IDEAS, page 129-136. IEEE Computer Society, (2006)iDataGuard: an interoperable security middleware for untrusted internet data storage., , , , and . Middleware (Companion), page 36-41. ACM, (2008)Protecting personal data from untrusted web-based data services., , and . Netw. Secur., 2011 (9): 11-16 (2011)Contrained Generalization For Data Anonymization - A Systematic Search Based Approach., , , and . CoRR, (2021)A middleware approach for outsourcing data securely., , , , and . Comput. Secur., (2013)Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach., , and . SDM, page 497-502. SIAM, (2007)Pvault: a client server system providing mobile access to personal data., , and . StorageSS, page 123-129. ACM, (2005)Middleware support for protecting personal data from web based data services.. Middleware (Doctoral Symposium), page 18. ACM, (2007)Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine., , , , and . ACSAC, page 57-66. IEEE Computer Society, (2006)gVault: A Gmail Based Cryptographic Network File System., , , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 161-176. Springer, (2007)