Author of the publication

Towards more Transparency in Quality of Protection for Infrastructure Clouds.

, and . QUATIC, page 285-290. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topic 6 Grid and Cluster Computing., , , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 359. Springer, (2007)Towards more Transparency in Quality of Protection for Infrastructure Clouds., and . QUATIC, page 285-290. IEEE Computer Society, (2012)Controlling Usage in Business Process Workflows through Fine-Grained Security Policies., , , , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 100-117. Springer, (2008)Security Requirements Analysis for Large-Scale Distributed File Systems., , , and . Euro-Par Workshops, volume 4375 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)A Work-Systems Approach to Classifying Risks in Crowdfunding Platforms: An Exploratory Analysis., , and . AMCIS, Association for Information Systems, (2015)On trust management in grids., , and . Autonomics, volume 302 of ACM International Conference Proceeding Series, page 4. ACM, (2007)Scope of Forensics in Grid Computing - Vision and Perspectives., , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 964-970. Springer, (2006)A Secure and Scalable Grid-Based Content Management System., , , , and . ARES, page 404-409. IEEE Computer Society, (2010)Towards Modelling Obligations in Event-B., , , , and . ABZ, volume 5238 of Lecture Notes in Computer Science, page 181-194. Springer, (2008)Managing Conflicts of Interest in Virtual Organisations., , , and . STM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 45-56. Elsevier, (2007)