Author of the publication

Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.

, , , , , and . SERVICES, page 75-83. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities., , , and . MedInfo, volume 129 of Studies in Health Technology and Informatics, page 483-487. IOS Press, (2007)Trust Management Tools for Internet Applications., and . iTrust, volume 2692 of Lecture Notes in Computer Science, page 91-107. Springer, (2003)A Survey of Trust in Internet Applications., and . IEEE Commun. Surv. Tutorials, 3 (4): 2-16 (2000)First international workshop on privacy and security in programming (PSP)., , and . SPLASH (Companion Volume), page 83-84. ACM, (2014)Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud., , , , , , , and . SOLI, page 111-116. IEEE, (2012)A Risk Management Framework for Health Care Data Anonymization., and . HealthSec, USENIX Association, (2010)Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques., , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 265-271. Springer, (2011)Cloud Log Forensics Metadata Analysis., , , and . COMPSAC Workshops, page 194-199. IEEE Computer Society, (2012)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Specifying and Analysing Trust for Internet Applications, and . (2002)