Author of the publication

Policy Driven Node Selection in MapReduce.

, , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 55-72. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeCore: Detecting Content Repurposing Attacks on Clients' Systems., and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 199-216. Springer, (2010)PriMa: an effective privacy protection mechanism for social networks., , and . AsiaCCS, page 320-323. ACM, (2010)Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation., , , and . POLICY, page 118-125. IEEE Computer Society, (2009)Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks., and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 113-124. Springer, (2013)Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites., , , and . IEEE Trans. Knowl. Data Eng., 27 (1): 193-206 (2015)Promoting Distributed Accountability in the Cloud., , , and . IEEE CLOUD, page 113-120. IEEE Computer Society, (2011)Preventing Information Leakage from Indexing in the Cloud., , and . IEEE CLOUD, page 188-195. IEEE Computer Society, (2010)A3P: adaptive policy prediction for shared images over popular content sharing sites., , , and . HT, page 261-270. ACM, (2011)Towards a Game Theoretical Model for Identity Validation in Social Network Sites., , and . SocialCom/PASSAT, page 1081-1088. IEEE Computer Society, (2011)Policy Driven Node Selection in MapReduce., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 55-72. Springer, (2014)