Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing an On-the-Fly Garbage Collector for Java., , , , , , , , and . ISMM, page 155-166. ACM, (2000)Evolving Domains, Problems and Solutions for Long Term Digital Preservation., , , , , and . iPRES, (2011)End-to-end secure insurance telematics., and . SYSTOR, page 182. ACM, (2019)Protecting Sensitive Tabular Data in Hybrid Clouds., , , and . CoRR, (2023)Secure store for FHIR resources with Parquet encryption., , and . SYSTOR, page 29:1. ACM, (2021)From VISION Cloud to Cloudwave: Towards the Future Internet and a New Generation of Services., , , , , and . INCoS, page 641-646. IEEE, (2014)Exploiting cloud computing - A proposed methodology for generating new business., , , , , , and . ICIN, page 241-246. IEEE, (2011)Creating a Privacy-aware Framework for Fine-grained Data Access.. ERCIM News, (2023)Towards the future internet: the RESERVOIR, VISION Cloud, and CloudWave experiences., , , , , and . Int. J. High Perform. Comput. Netw., 8 (3): 235-247 (2015)Implementing secure, policy-driven data access in a cloud environment., and . SYSTOR, page 143. ACM, (2022)