Author of the publication

Secure Data Analytics for Cloud-Integrated Internet of Things Applications.

, , , , and . IEEE Cloud Comput., 3 (2): 46-56 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Security Agents for the DOK Federated System.. DBSec, volume 113 of IFIP Conference Proceedings, page 35-59. Chapman & Hall, (1997)A Role-Based Access Control for Intranet Security., and . IEEE Internet Comput., 1 (5): 24-34 (1997)Special Issue: Distributed Objects and Applications '99., and . Concurr. Comput. Pract. Exp., 13 (7): 503-505 (2001)Using agents for secure access to data in the Internet.. IEEE Commun. Mag., 35 (6): 136-140 (1997)Book Preview., , and . Interactions, 7 (6): 47-50 (2000)A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis., , , , , , , and . IEEE Trans. Emerg. Top. Comput., 2 (3): 267-279 (2014)Toward the Right Communication Protocol for Web Services., , , and . Int. J. Web Serv. Res., 2 (2): 19-42 (2005)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distributed Comput., 65 (7): 832-842 (2005)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , and . J. Parallel Distributed Comput., (2019)A Model Predictive Controller for Managing QoS Enforcements and Microarchitecture-Level Interferences in a Lambda Platform., , and . IEEE Trans. Parallel Distributed Syst., 29 (7): 1442-1455 (2018)