Author of the publication

myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management.

, , , , , , and . WICSA/ECSA Companion Volume, volume 704 of ACM International Conference Proceeding Series, page 82-83. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insiders analysis in Cloud computing focusing on home healthcare system., , and . ICITST, page 350-357. IEEE, (2011)A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation., and . HAISA, page 53-68. University of Plymouth, (2014)Formalizing Trust Requirements and Specification in Service Workflow Environments., and . ICEIS (3), page 196-206. SciTePress, (2011)On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis., , , and . UCC, page 217-226. IEEE Computer Society, (2015)Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices., , , and . CoRR, (2016)A verification system for interval-based specification languages., , , and . ACM Trans. Softw. Eng. Methodol., 19 (4): 13:1-13:36 (2010)Innovations for Grid Security from Trusted Computing., , , and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 132-149. Springer, (2006)Towards an open, trusted digital rights management platform., and . Digital Rights Management Workshop, page 79-88. ACM, (2006)Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach., , , , and . CLOUD, page 556-563. IEEE Computer Society, (2015)W Reconstructed., and . ZUM, volume 1212 of Lecture Notes in Computer Science, page 115-134. Springer, (1997)