Author of the publication

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing.

, , , , , and . J. Cloud Comput., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Server-side Approach to Privacy Policy Matching., , , and . ARES, page 609-614. IEEE Computer Society, (2011)A Secure MANET Routing Protocol for Crisis Situations., , and . Int. J. Syst. Softw. Secur. Prot., 9 (4): 17-45 (2018)On the Adoption of Usage Control Technology in Collaborative Environments., and . IICS, volume P-204 of LNI, page 142-153. GI, (2012)Federated Identity Management and Usage Control - Obstacles to Industry Adoption., and . ARES, page 31-41. IEEE Computer Society, (2013)Privacy in a Semantic Cloud: What's Trust Got to Do with It?, and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 107-118. Springer, (2009)Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies., and . iNetSeC, volume 7039 of Lecture Notes in Computer Science, page 89-103. Springer, (2011)Usage Control Enforcement - A Survey.. ARES, volume 6908 of Lecture Notes in Computer Science, page 38-49. Springer, (2011)Design and Implementation of a CBR-based Privacy Agent., , and . ARES, page 317-326. IEEE Computer Society, (2012)Seeking Risks: Towards a Quantitative Risk Perception Measure., and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 256-271. Springer, (2013)Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective., and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 317-331. Springer, (2012)