Author of the publication

Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing.

, , , , , and . ISORC Workshops, page 124-129. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-peer networks and collective intelligence: the case for agency., , and . IJGUC, 3 (4): 233-241 (2012)A grouped P2P network for scalable grid information services., , , and . Peer-to-Peer Networking and Applications, 2 (1): 3-12 (2009)An optimized two-tier P2P architecture for contextualized keyword searches., and . Future Generation Comp. Syst., 23 (2): 241-251 (2007)Special section: Management and optimisation of P2P and Grid systems with network economics., and . Future Generation Comp. Syst., 26 (8): 1282-1284 (2010)Meta-scheduling algorithms for managing inter-cloud interoperability., , , and . IJHPCN, 7 (3): 156-172 (2013)Access control for agent-based computing: a distributed approach., , and . Internet Research, 11 (1): 55-64 (2001)Using Self-led Critical Friend Topology Based on P2P Chord Algorithm for Node Localization within Cloud Communities., , and . CISIS, page 490-495. IEEE Computer Society, (2011)Towards an Understanding of Peer Rationality and Collective Intelligence., , and . CISIS, page 385-390. IEEE Computer Society, (2011)Taking the Business Intelligence to the Clouds., , , and . HPCC-ICESS, page 953-958. IEEE Computer Society, (2012)Small World Architecture for Peer-to-Peer Networks., , and . IAT Workshops, page 451-454. IEEE Computer Society, (2006)