Author of the publication

Poster: LBMS: load balancing based on multilateral security in cloud.

, , , , , , and . ACM Conference on Computer and Communications Security, page 861-864. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StreamNet: A DAG System with Streaming Graph Computing., , , , , , , , and . CoRR, (2019)OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud., , , , , and . CLOUD, page 51-58. IEEE, (2016)On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis., , , and . UCC, page 217-226. IEEE Computer Society, (2015)TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing., , , and . ICWS, volume 10966 of Lecture Notes in Computer Science, page 67-83. Springer, (2018)A separation-of-powers model for a trustworthy and open cloud computing ecosystem.. University of Oxford, UK, (2014)British Library, EThOS.SCOBA: source code based attestation on custom software., , , , and . ACSAC, page 337-346. ACM, (2010)Poster: LBMS: load balancing based on multilateral security in cloud., , , , , , and . ACM Conference on Computer and Communications Security, page 861-864. ACM, (2011)myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management., , , , , , and . WICSA/ECSA Companion Volume, volume 704 of ACM International Conference Proceeding Series, page 82-83. ACM, (2012)Trusted Isolation Environment: An Attestation Architecture with Usage Control Model., , , , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 226-240. Springer, (2009)Towards Trustworthy Resource Scheduling in Clouds., and . IEEE Trans. Information Forensics and Security, 8 (6): 973-984 (2013)