Author of the publication

Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.

, , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical characterization of a live streaming media workload., , , , and . IEEE/ACM Trans. Netw., 14 (1): 133-146 (2006)The Cyclone Server Architecture: streamlining delivery of popular content., , and . Comput. Commun., 25 (4): 403-412 (2002)Server-Initated Document Dissemination for the WWW., and . IEEE Data Eng. Bull., 19 (3): 3-11 (1996)Preface to special issue: lightweight and practical formal methods in the design and analysis of safety-critical systems., and . Math. Struct. Comput. Sci., 23 (4): 675 (2013)Load Profiling Based Routing for Guaranteed Bandwidth Flows., , and . Eur. Trans. Telecommun., 10 (2): 165-181 (1999)Software-Defined IDS for securing embedded mobile devices., , and . HPEC, page 1-7. IEEE, (2013)An information-theoretic framework for field monitoring using autonomously mobile sensors., , , and . Ad Hoc Networks, 9 (6): 1049-1058 (2011)CloudPack - Exploiting Workload Flexibility through Rational Pricing., , , and . Middleware, volume 7662 of Lecture Notes in Computer Science, page 374-393. Springer, (2012)Real-Time Mutable Broadcast Disks., and . RTDB, page 3-22. Kluwer Academic Publishers, (1997)Implications of Selfish Neighbor Selection in Overlay Networks., , , and . INFOCOM, page 490-498. IEEE, (2007)