Cory Thoma

According to our database1, Cory Thoma authored at least 6 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2016
PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

2015
CE-Storm: Confidential Elastic Processing of Data Streams.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

CryptStream: Cryptographic Access Controls for Streaming Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Automated operator placement in distributed Data Stream Management Systems subject to user constraints.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014


  Loading...