Author of the publication

Information security policies and actions in modern integrated systems

, and (Eds.) Idea Group Pub., Hershey, PA, (2004)
DOI: 10.4018/978-1-59140-186-5

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulations of Risks for Monitoring and Prevention., , , , and . SEKE, page 602-607. Knowledge Systems Institute Graduate School, (2011)Quality analysis of composed services through fault injection., , and . Inf. Syst. Frontiers, 11 (3): 227-239 (2009)Context-Aware Composition of E-services., , , , , and . TES, volume 2819 of Lecture Notes in Computer Science, page 28-41. Springer, (2003)Business process co-design for energy-aware adaptation., , , , and . ICCP, page 463-470. IEEE, (2011)Risk Management through Real-Time Wearable Services., , , and . ICSEA, page 163-168. IEEE Computer Society, (2009)Techniques for the Analysis of Conceptual Schema., , , and . SEBD, page 57-82. (1995)Una estensione fuzzy del modello relazionale per il riutilizzo di componenti software., , and . SEBD, page 161-179. STAR - Servizio Tecnografico Area Ricerca CNR, Pisa, (1996)An Environment for Designing Exceptions in Workflows., , and . Inf. Syst., 24 (3): 255-273 (1999)Applying Enterprise Models to Design Cooperative Scientific Environments., , , , and . Business Process Management Workshops, 3812, page 281-292. (2005)Risk Characterization and Prototyping., , and . NOTERE, page 57-64. IEEE, (2010)