Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Federated Cloud Ecosystem: Enabling Managed Cloud Service Consumption., , , and . GECON, volume 7714 of Lecture Notes in Computer Science, page 223-233. Springer, (2012)Mapping Legal Requirements to SLAs: An Ontology Based Approach for Cloud-based Service Consumption., , and . SW4LAW+DC@JURIX, volume 1296 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)TRESOR - Towards the Realization of a Trusted Cloud Ecosystem., , , , , and . Trusted Cloud Computing, Springer, (2014)Innovative Architektur f ür sicheres Cloud Computing: Beispiel eines Cloud-Ecosystems im Gesundheitswesen., , , , , , and . GI-Jahrestagung, volume P-208 of LNI, page 1075-1082. GI, (2012)A Performance Analysis of the XACML Decision Process and the Impact of Caching., , and . SITIS, page 216-223. IEEE Computer Society, (2015)"Please, No More GUIs!": A User Study, Prototype Development and Evaluation on the Integration of Attribute-Based Encryption in a Hospital Environment., , and . COMPSAC Workshops, page 496-502. IEEE Computer Society, (2016)Enabling location-based policies in a healthcare cloud computing environment., , , , , and . CLOUDNET, page 333-338. IEEE, (2014)Deriving a Distributed Cloud Proxy Architecture for Managed Cloud Service Consumption., , , and . IEEE CLOUD, page 614-620. IEEE, (2013)An IPTV Service State API for converging managed and unmanaged IPTV infrastructures., , and . ICME, page 1493-1498. IEEE Computer Society, (2010)Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things., , , and . DSDIS, page 556-563. IEEE, (2015)