Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection., , and . CIT, page 851-858. IEEE Computer Society, (2010)Overcoming Barriers for Ubiquitous User-Centric Healthcare Services., , , and . IEEE Cloud Computing, 3 (6): 64-74 (2016)Evaluating Confidence in Context for Context-Aware Security., , and . AmI, volume 4794 of Lecture Notes in Computer Science, page 211-229. Springer, (2007)A component-based policy-neutral architecture for kernel-level access control., , and . Annales des Télécommunications, 64 (1-2): 121-146 (2009)Self-Stabilizing Virtual Machine Hypervisor Architecture for Resilient Cloud., , , , , , , , and . SERVICES, page 200-207. IEEE Computer Society, (2014)Brief Announcement: An OS Architecture for Device Self-protection., , and . SSS, volume 5873 of Lecture Notes in Computer Science, page 783-784. Springer, (2009)A QoS and Security Adaptation Model for Autonomic Pervasive Systems., and . COMPSAC, page 943-948. IEEE Computer Society, (2008)Think: View-Based Support of Non-functional Properties in Embedded Systems., , , , , , , , , and 5 other author(s). ICESS, page 147-156. IEEE Computer Society, (2009)Pervasive authentication and authorization infrastructures for mobile users., , , , , , , and . Computers & Security, 29 (4): 501-514 (2010)Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers., , , and . CloudCom, page 239-242. IEEE Computer Society, (2018)