Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding approaches for web service composition and execution., , , and . Bangalore Compute Conf., page 1. ACM, (2008)User controllable security and privacy for mobile mashups., , , , and . HotMobile, page 35-40. ACM, (2011)AI-Assisted Security Controls Mapping for Clouds Built for Regulated Workloads., , , , , and . CLOUD, page 136-146. IEEE, (2021)Compliance-as-Code for Cybersecurity Automation in Hybrid Cloud., , , , , and . CLOUD, page 427-437. IEEE, (2022)An Architecture for Secure Generation and Verification of Electronic Coupons., , , and . USENIX Annual Technical Conference, General Track, page 51-63. USENIX, (2001)Clock rate versus IPC: the end of the road for conventional microarchitectures., , , and . ISCA, page 248-259. IEEE Computer Society, (2000)Building Applications Using End to End Composition of Web Services., , , , , , , , and . AAAI, page 1672-1673. AAAI Press / The MIT Press, (2005)A Customizable Mediation Engine for Metrics Collection, Aggregation and Composition., and . NOMS, page 162-173. IEEE, (2006)Usage Metering for Service-Oriented Grid Computing., , and . IJEBR, 2 (1): 78-106 (2006)Co-operative content adaptation framework: satisfying consumer and content creator in resource constrained browsing., , , , , , and . WWW (Companion Volume), page 221-222. International World Wide Web Conferences Steering Committee / ACM, (2013)