Confidential database-as-a-service approaches: taxonomy and survey J Köhler, K Jünemann, H Hartenstein Journal of Cloud Computing 4, 1-14, 2015 | 23 | 2015 |
Towards a basic dht service: Analyzing network characteristics of a widely deployed dht K Junemann, P Andelfinger, H Hartenstein 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 19 | 2011 |
Bitmon: A tool for automated monitoring of the bittorrent dht K Junemann, P Andelfinger, J Dinger, H Hartenstein 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-2, 2010 | 19 | 2010 |
Securus: From confidentiality and access requirements to data outsourcing solutions J Köhler, K Jünemann Privacy and Identity Management for Emerging Services and Technologies: 8th …, 2014 | 8 | 2014 |
Data outsourcing simplified: Generating data connectors from confidentiality and access policies K Jünemann, J Köhler, H Hartenstein 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012 | 8 | 2012 |
Parallelism potentials in distributed simulations of kademlia-based peer-to-peer networks P Andelfinger, K Jünemann, H Hartenstein Seventh International Conference on Simulation Tools and Techniques, 2014 | 7 | 2014 |
Ovlvis: visualization of peer-to-peer networks in simulation and testbed environments K Jünemann, J Dinger Proceedings of the 11th communications and networking simulation symposium …, 2008 | 5 | 2008 |
Yowie: Information extraction in a service enabled world M Kowalkiewicz, K Jünemann Service-Oriented Computing–ICSOC 2008: 6th International Conference, Sydney …, 2008 | 4 | 2008 |
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems K Jünemann KIT Scientific Publishing, 2015 | 3 | 2015 |
Improving information quality in email exchanges by identifying entities and related objects M Kowalkiewicz, K Juenemann Proceedings of the 2nd ACM workshop on Information credibility on the web, 81-84, 2008 | 2 | 2008 |
Self-optimization of dht lookups through run-time performance analysis K Jünemann, H Hartenstein 2014 International Conference on High Performance Computing & Simulation …, 2014 | 1 | 2014 |
SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service J Köhler, K Jünemann, H Hartenstein PIK-Praxis der Informationsverarbeitung und Kommunikation 37 (2), 149-155, 2014 | 1 | 2014 |
Dsn research group-live monitoring K Jünemann History 13, 11, 2012 | 1 | 2012 |
Autonome Kommunikationsinfrastrukturen. Eine praxisnahe Betrachtung J Dinger, K Jünemann, O Waldhorst, M Conrad Walter de Gruyter GmbH & Co. KG 31 (2), 69-75, 2008 | 1 | 2008 |
Forschungsgruppe DSN-Networked Content & Security K Jünemann Konrad Jünemann (inaktiv), 2015 | | 2015 |
Forschungsgruppe DSN-Networked Systems Simulation K Jünemann Konrad Jünemann (inaktiv), 2015 | | 2015 |
Forschungsgruppe DSN-Lehrinhalt ITSMan K Jünemann Konrad Jünemann (inaktiv), 2014 | | 2014 |
DSN Research Group-Lehrinhalt NetSim K Jünemann Konrad Jünemann (inaktiv), 2014 | | 2014 |
Forschungsgruppe DSN-Peer-to-Peer und Cloud Computing K Jünemann Konrad Jünemann, 2012 | | 2012 |
DSN Research Group-MeRegioMobil K Jünemann Konrad Jünemann (inaktiv), 2012 | | 2012 |