Author of the publication

Configuring storage-area networks using mandatory security.

, , , and . Journal of Computer Security, 17 (2): 191-210 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microfilm, paper, and OCR: issues in newspaper digitization at the Utah digital newspapers program, and . http://content.lib.utah.edu/u?/ir-main,114, (March 2004)Child-centred design supported by comprehensive child application use analysis., and . IDC, page 707-712. ACM, (2016)A Cloud-based Data Analysis Framework for Object Recognition., and . CLOSER, page 79-86. SciTePress, (2015)A Formalization of Software Architecture., , , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 116-133. Springer, (1999)Compressed domain-specific data processing and analysis., and . IEEE BigData, page 325-330. IEEE Computer Society, (2017)Mobile Agent Architecture Integration for a Wireless Sensor Medical Application., , , , and . IAT Workshops, page 235-238. IEEE Computer Society, (2006)A Cloud-Based Mobile Data Analytics Framework: Case Study of Activity Recognition Using Smartphone., and . MobileCloud, page 220-227. IEEE Computer Society, (2014)User interaction monitoring and analysis framework., and . MOBILESoft, page 7-8. ACM, (2016)An algorithm for distributed certificate chain discovery in open environments., and . SAC, page 2292-2298. ACM, (2015)A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems., , , and . J. Networks, 3 (3): 57-70 (2008)