Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures., , , , and . CloudComp, volume 34 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 73-82. Springer, (2009)Real-Time Management and Control of Monitoring Elements In Dynamic Cloud Network Systems., , and . CloudNet, page 1-7. IEEE, (2018)How CLEVER-based clouds conceive horizontal and vertical federations., , , , and . ISCC, page 167-172. IEEE Computer Society, (2011)How the Dataweb Can Support Cloud Federation: Service Representation and Secure Data Exchange., , , and . NCCA, page 73-79. IEEE Computer Society, (2012)Energy Sustainability in Cooperating Clouds., , , and . CLOSER, page 83-89. SciTePress, (2013)Orchestration in the Cloud-to-Things Compute Continuum: Taxonomy, Survey and Future Directions., , , , , , , and . CoRR, (2023)Homomorphic Routing: Private Data Forwarding in the Internet., , and . FIRA@SIGCOMM, page 1-7. ACM, (2023)DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy., , and . ICCCN, page 1-7. IEEE, (2023)WIM on-demand - A modular approach for managing network slices., , , and . NetSoft, page 395-403. IEEE, (2020)How to Federate VISION Clouds through SAML/Shibboleth Authentication., , , and . ESOCC, volume 7592 of Lecture Notes in Computer Science, page 259-274. Springer, (2012)