Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key assignment for enforcing access control policy exceptions in distributed systems., , and . Inf. Sci., (2003)AID: A global anti-DoS service., , , and . Comput. Networks, 51 (15): 4252-4269 (2007)Dynamic Personalization for Meta-Queriers., , and . IRI, page 360-365. IEEE Systems, Man, and Cybernetics Society, (2009)Enforcing complex security policies for commercial applications., and . COMPSAC, page 402-408. IEEE Computer Society, (1995)An Extended Capability Architecture To Enforce Dynamic Access Control Policies., and . ACSAC, page 148-157. IEEE Computer Society, (1996)Modeling and Simulation of Context-Awareness.. Annual Simulation Symposium, IEEE Computer Society, (2006)Web service composition based on integrated substitution and adaptation., and . IRI, page 34-39. IEEE Systems, Man, and Cybernetics Society, (2008)Reuse-Oriented Mapping Discovery for Meta-querier Customization., and . DEXA (1), volume 6860 of Lecture Notes in Computer Science, page 78-93. Springer, (2011)A Web Service Similarity Refinement Framework Using Automata Comparison., and . ICISTM, volume 54 of Communications in Computer and Information Science, page 44-55. Springer, (2010)Challenges of Future Distributed Computing Systems., , , , and . FTDCS, page 376. IEEE Computer Society, (2003)