Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technical Forum : WORM storage is not enough., and . IBM Systems Journal, 46 (2): 363-369 (2007)Busses., and . The Computer Science and Engineering Handbook, CRC Press, (1997)Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records., and . SIGMOD Conference, page 395-406. ACM, (2005)Access Control Friendly Query Verification for Outsourced Data Publishing., , , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 177-191. Springer, (2008)Characteristics of I/O traffic in personal computer and server workloads., and . IBM Systems Journal, 42 (2): 347-372 (2003)Trustworthy keyword search for compliance storage., , , and . VLDB J., 17 (2): 225-242 (2008)I/O reference behavior of production database workloads and the TPC benchmarks - an analysis at the logical level., , and . ACM Trans. Database Syst., 26 (1): 96-143 (2001)The performance impact of I/O optimizations and disk improvements., and . IBM Journal of Research and Development, 48 (2): 255-289 (2004)Trustworthy Keyword Search for Regulatory-Compliant Record Retention., , and . VLDB, page 1001-1012. ACM, (2006)Trustworthy Migration and Retrieval of Regulatory Compliant Records., , , and . MSST, page 100-113. IEEE Computer Society, (2007)