Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A QoS framework for multimedia applications in mobile ad hoc networks., , , , , and . Comput. Syst. Sci. Eng., (2007)Secure Interoperation in a Multidomain Environment Employing RBAC Policies., , , and . IEEE Trans. Knowl. Data Eng., 17 (11): 1557-1577 (2005)Dependencies and separation of duty constraints in GTRBAC., , , and . SACMAT, page 51-64. ACM, (2003)Wireless network resource management for Web-based multimedia document services., , , , and . IEEE Communications Magazine, 41 (3): 138-145 (2003)Incorporating Privacy into the Undergraduate Curriculum., , , and . InfoSecCD, page 1-7. ACM, (2013)Orchestration and Management of Adaptive IoT-Centric Distributed Applications., , , , , , , and . IEEE Internet Things J., 11 (3): 3779-3791 (February 2024)Collaborative Business Process Fault Resolution in the Services Cloud., , , , and . IEEE Trans. Serv. Comput., 16 (1): 162-176 (January 2023)A Framework for Dynamic Composition and Management of Emergency Response Processes., , , , , , and . IEEE Trans. Serv. Comput., 15 (4): 2018-2031 (2022)Privacy-Preserving Subgraph Discovery., , , , , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 161-176. Springer, (2012)Privacy-preserving trust verification., , , and . SACMAT, page 139-148. ACM, (2010)