Author of the publication

Efficient Distribution of Virtual Machines for Cloud Computing.

, , , and . PDP, page 567-574. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy/performance trade-off in private search on bio-medical data., , , and . Future Generation Comp. Syst., (2014)A digital file inventory of the Queens College Special Collections and Archives: Findings, analysis and recommendations for long-term preservation., , , , and . OCLC Systems & Services, 30 (2): 78-90 (2014)Hidden messages: evaluating the efficiency of code elision in program navigation., and . Interacting with Computers, 15 (3): 387-407 (2003)Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques., , , and . J. Parallel Distrib. Comput., 66 (9): 1189-1204 (2006)Composition and Execution of Secure Workflows in WSRF-Grids., , and . CCGRID, page 122-129. IEEE Computer Society, (2008)A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure., , , and . CEC, page 215-222. IEEE Computer Society, (2005)Security for service-oriented on-demand grid computing.. University of Marburg, (2008)An identity-based security infrastructure for Cloud environments., , , , and . WCNIS, page 644-649. IEEE, (2010)Debunking Security-Usability Tradeoff Myths., , , , and . IEEE Security & Privacy, 14 (5): 33-39 (2016)An Empirical Study of Textual Key-Fingerprint Representations., , , , , and . USENIX Security Symposium, page 193-208. USENIX Association, (2016)