Author of the publication

A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution.

, , and . IEEE Trans. Dependable Sec. Comput., 4 (1): 1-17 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Joris van Slageren University of Stuttgart

Electrocatalytic proton reduction: Metal based fused diporphyrins with proton relays for efficient catalysis, , , , , , , , and . Dataset, (2024)Related to: Chandra, S., Singha Hazari, A., Song, Q., Hunger, D., Neuman, N. I., van Slageren, J., Klemm, E. & Sarkar, B. (2023). Remarkable Enhancement of Catalytic Activity of Cu-Complexes in the Electrochemical Hydrogen Evolution Reaction by Using Triply Fused Porphyrin. ChemSusChem 16, e202201146. doi: 10.1002/cssc.202201146.
 

Other publications of authors with the same name

Automated Incident Management for a Platform-as-a-Service Cloud., , , , and . Hot-ICE, USENIX Association, (2011)An Ontology-Based Framework for Model-Driven Analysis of Situations in Data Centers., , , , and . IEEE SCC, page 288-295. IEEE Computer Society, (2013)Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System., , and . PRDC, page 9-18. IEEE Computer Society, (2002)Towards automated provisioning of secure virtualized networks., , , and . ACM Conference on Computer and Communications Security, page 235-245. ACM, (2007)Group Communication Protocols and a Framework for Intrusion-Tolerant Distributed Applications.. IFIP Student Forum, page 93-104. Kluwer, (2004)Experiences with Building Disaster Recovery for Enterprise-Class Clouds., , , , and . DSN, page 231-238. IEEE Computer Society, (2015)Managing business health in the presence of malicious attacks., , , , , , , , and . DSN Workshops, page 9-14. IEEE Computer Society, (2011)Policy enforcement and compliance proofs for Xen virtual machines., , and . VEE, page 101-110. ACM, (2008)Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures., , , , and . LADC, volume 2847 of Lecture Notes in Computer Science, page 81-101. Springer, (2003)A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution., , and . IEEE Trans. Dependable Sec. Comput., 4 (1): 1-17 (2007)