Mathias Kohler

According to our database1, Mathias Kohler authored at least 13 papers between 2007 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Initial Encryption of large Searchable Data Sets using Hadoop.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
A framework for proactive caching in business process-driven environments.
PhD thesis, 2011

2009
ProActive Caching - A Framework for Performance Optimized Access Control Evaluations.
Proceedings of the POLICY 2009, 2009

ProActive Caching: Generating Caching Heuristics for Business Process Environments.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
ProActive Access Control for Business Process-Driven Environments.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Avoiding Policy-based Deadlocks in Business Processes.
Proceedings of the The Third International Conference on Availability, 2008

2007
Classification Model for Access Control Constraints.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007


  Loading...