Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Virtualization of Rich Applications for Distribution under a SaaS Model., , , and . CLOSER, page 370-373. SciTePress, (2013)Sharing Secure Documents in the Cloud - A Secure Layer for Google Docs., , , and . CLOSER, page 439-444. SciTePress, (2011)Video Surveillance Based on Cloud Storage., , , , and . IEEE CLOUD, page 991-992. IEEE Computer Society, (2012)A Survey on the State of the Art of Vulnerability Assessment Techniques., , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 203-213. Springer, (2021)Encrypted Domain Processing for Cloud Privacy - Concept and Practical Experience., , , , , and . CLOSER, page 591-596. SciTePress, (2011)A New Approach for Dynamic and Risk-Based Data Anonymization., , , and . CISIS, volume 1267 of Advances in Intelligent Systems and Computing, page 327-336. Springer, (2020)Cloud Spreadsheets Supporting Data Processing in the Encrypted Domain., , , and . CLOSER, page 514-520. SciTePress, (2015)PaaS Federation Analysis for Seamless Creation and Migration of Cloud Applications., , , and . CLOSER, page 156-159. SciTePress, (2013)