Author of the publication

Providing Security in Container-Based HPC Runtime Environments.

, , , and . ISC Workshops, volume 9945 of Lecture Notes in Computer Science, page 685-695. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallelized Critical Path Search in Electrical Circuit Designs., , , and . PDCAT, page 10-17. IEEE Computer Society, (2009)Cloud Infrastructure & Applications - CloudIA., , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 583-588. Springer, (2009)Providing Security in Container-Based HPC Runtime Environments., , , and . ISC Workshops, volume 9945 of Lecture Notes in Computer Science, page 685-695. (2016)An Ontology-based Approach for Failure Classification in Predictive Maintenance Using Fuzzy C-means and SWRL Rules., , , , and . KES, volume 159 of Procedia Computer Science, page 630-639. Elsevier, (2019)Rootless Containers with Podman for HPC., , and . ISC Workshops, volume 12321 of Lecture Notes in Computer Science, page 343-354. Springer, (2020)Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0., , , and . FiCloud Workshops, page 101-107. IEEE Computer Society, (2017)Towards a Self-protecting Cloud., and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 395-402. Springer, (2013)Creation of Digital Twins by Combining Fuzzy Rules with Artificial Neural Networks., and . IECON, page 5849-5854. IEEE, (2019)CollaboCloud - Kollaborationsplattform in der Cloud., , and . DFN-Forum Kommunikationstechnologien, volume P-166 of LNI, page 23-32. GI, (2010)Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0., and . CoRR, (2020)