Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Controls in Collaborative Business Processes., , and . PRO-VE, volume 186 of IFIP, page 247-254. Springer, (2005)POSSET - Policy-Driven Secure Session Transfer., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 13-24. Springer, (2005)Service level management convergence for future network enterprise platforms., , and . Future Network & Mobile Summit, page 1-9. IEEE, (2012)Bayesian characterization of multiple-slope sound energy decay in coupled-volume systems, , , and . Journal of the Acoustical Society of America, 129 (2): 741--752 (February 2011)The GEYSERS Concept and Major Outcomes., , , , , , , , , and 4 other author(s). Future Internet Assembly, volume 7858 of Lecture Notes in Computer Science, page 346-349. Springer, (2013)GEYSERS: A novel architecture for virtualization and co-provisioning of dynamic optical networks and IT services., , , , , , , , , and 14 other author(s). Future Network & Mobile Summit, page 1-8. IEEE, (2011)Extensible Security Patterns.. DEXA Workshops, page 729-733. IEEE Computer Society, (2007)Revisiting the Firewall Abolition Act., and . HICSS, page 206. IEEE Computer Society, (2003)Dynamic virtual organization management for service oriented enterprise applications., , and . CollaborateCom, IEEE Computer Society / ICST, (2005)Taxonomy and Requirements Rationalization for Infrastructure in Cloud-based Software Testing., and . CloudCom, page 454-461. IEEE Computer Society, (2011)