Author of the publication

Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.

, , , , , , , and . ACSAC, page 276-285. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical inference of internal network loss and topology., , , , and . SIGMETRICS Performance Evaluation Review, 27 (3): 5-6 (1999)Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments., and . Mobidata, volume 353 of The Kluwer International Series in Engineering and Computer Science, page 207-228. Kluwer / Springer, (1994)Impromptu Measurement Infrastructures using RTP., , and . INFOCOM, page 1490-1499. IEEE Computer Society, (2002)Confidant: Protecting OSN Data without Locking It Up., , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 61-80. Springer, (2011)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)The Case for VM-Based Cloudlets in Mobile Computing., , , and . IEEE Pervasive Computing, 8 (4): 14-23 (2009)Virtual individual servers as privacy-preserving proxies for mobile devices., , , , and . MobiHeld, page 37-42. ACM, (2009)Deriving Long-Term Value from Context-Aware Computing., , , , , and . IS Management, 22 (4): 32-42 (2005)Bar Codes Everywhere You Look., and . IEEE Pervasive Computing, 9 (2): 4-5 (2010)Multicast-based inference of network-internal loss characteristics., , , and . IEEE Trans. Information Theory, 45 (7): 2462-2480 (1999)