default search action
HariGovind V. Ramasamy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c29]Long Wang, Harigovind V. Ramasamy, Richard E. Harper:
Scheduling Physical Machine Maintenance on Qualified Clouds: What if Migration is not Allowed? CLOUD 2020: 485-492
2010 – 2019
- 2019
- [c28]Long Wang, Harigovind V. Ramasamy, Valentina Salapura, Robin Arnold, Xu Wang, Senthil Bakthavachalam, Phil Coulthard, Lee Suprenant, John Timm, Denis Ricard, Richard E. Harper, Ahut Gupta:
System Restore in a Multi-cloud Data Pipeline Platform. DSN (Industry Track) 2019: 21-24 - [c27]Uttam Thakore, Harigovind V. Ramasamy, William H. Sanders:
Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response. ISSRE Workshops 2019: 53-58 - [c26]Uttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, HariGovind V. Ramasamy:
Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing. SRDS 2019: 269-274 - 2017
- [c25]Long Wang, Harigovind V. Ramasamy, Alexei Karve, Richard E. Harper:
Providing Resiliency to Orchestration and Automation Engines in Hybrid Cloud. DSN Workshops 2017: 125-128 - 2016
- [c24]Long Wang, Richard E. Harper, Ruchi Mahindru, Harigovind V. Ramasamy:
Disaster Recovery for Cloud-Hosted Enterprise Applications. CLOUD 2016: 432-439 - [c23]Long Wang, Harigovind V. Ramasamy, Ruchi Mahindru, Richard E. Harper:
Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud. DSN Workshops 2016: 264 - [c22]Rongda Zhu, Yu Deng, Soumitra Sarkar, Kaoutar El Maghraoui, Harigovind V. Ramasamy, Alan Bivens:
Towards More Effective Solution Retrieval in IT Support Services Using Systems Log. ICSOC 2016: 730-744 - 2015
- [c21]Long Wang, Harigovind V. Ramasamy, Richard E. Harper, Mahesh Viswanathan, Edmond Plattier:
Experiences with Building Disaster Recovery for Enterprise-Class Clouds. DSN 2015: 231-238 - 2013
- [c20]Yu Deng, Ronnie Sarkar, HariGovind V. Ramasamy, Rafah Hosn, Ruchi Mahindru:
An Ontology-Based Framework for Model-Driven Analysis of Situations in Data Centers. IEEE SCC 2013: 288-295 - [c19]Saeed Al-Haj, Ehab Al-Shaer, HariGovind V. Ramasamy:
Security-Aware Resource Allocation in Clouds. IEEE SCC 2013: 400-407 - 2011
- [c18]Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. DSN Workshops 2011: 9-14 - [c17]HariGovind V. Ramasamy, Cheng-Lin Tsao, Birgit Pfitzmann, Nikolai Joukov, James W. Murray:
Towards Automated Identification of Security Zone Classification in Enterprise Networks. Hot-ICE 2011 - [c16]Soumitra Sarkar, Ruchi Mahindru, Rafah Hosn, Norbert G. Vogl, HariGovind V. Ramasamy:
Automated Incident Management for a Platform-as-a-Service Cloud. Hot-ICE 2011 - [e1]John Banghart, Ehab Al-Shaer, Tony Sager, HariGovind V. Ramasamy:
4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011. IEEE 2011 [contents] - 2010
- [j4]Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias Schunter, Christian Stüble:
Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18(1): 89-121 (2010) - [c15]Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Murthy V. Devarakonda:
Application-storage discovery. SYSTOR 2010
2000 – 2009
- 2009
- [c14]Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Norbert G. Vogl, Murthy V. Devarakonda, Tryg Ager:
ITBVM: IT Business Value Modeler. IEEE SCC 2009: 128-135 - 2008
- [j3]HariGovind V. Ramasamy, Prashant Pandey, Michel Cukier, William H. Sanders:
Experiences with building an intrusion-tolerant group communication system. Softw. Pract. Exp. 38(6): 639-666 (2008) - [c13]Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter:
Policy enforcement and compliance proofs for Xen virtual machines. VEE 2008: 101-110 - 2007
- [j2]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution. IEEE Trans. Dependable Secur. Comput. 4(1): 1-17 (2007) - [c12]Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization. ATC 2007: 372-384 - [c11]Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:
Towards automated provisioning of secure virtualized networks. CCS 2007: 235-245 - [c10]Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner:
Architecting Dependable and Secure Systems Using Virtualization. WADS 2007: 124-149 - [c9]HariGovind V. Ramasamy, Mouna Seri, William H. Sanders:
The coBFIT toolkit. PODC 2007: 350-351 - [c8]Dan Dobre, HariGovind V. Ramasamy, Neeraj Suri:
On the Latency Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast. SRDS 2007: 311-322 - 2006
- [b1]Harigovind V. Ramasamy:
Parsimonious Service Replication for Tolerating Malicious Attacks in Asynchronous Environments. University of Illinois Urbana-Champaign, USA, 2006 - [j1]Partha P. Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar:
An architecture for adaptive intrusion-tolerant applications. Softw. Pract. Exp. 36(11-12): 1331-1354 (2006) - [i1]HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. IACR Cryptol. ePrint Arch. 2006: 82 (2006) - 2005
- [c7]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution. LADC 2005: 206-225 - [c6]HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. OPODIS 2005: 88-102 - 2004
- [c5]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
CoBFIT: A Component-Based Framework for Intrusion Tolerance. EUROMICRO 2004: 591-600 - [c4]HariGovind V. Ramasamy:
Group Communication Protocols and a Framework for Intrusion-Tolerant Distributed Applications. IFIP Student Forum 2004: 93-104 - 2003
- [c3]Vishu Gupta, Vinh Vi Lam, HariGovind V. Ramasamy, William H. Sanders, Sankalp Singh:
Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures. LADC 2003: 81-101 - 2002
- [c2]HariGovind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders:
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. DSN 2002: 229-238 - [c1]HariGovind V. Ramasamy, Michel Cukier, William H. Sanders:
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. PRDC 2002: 9-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint