Author of the publication

EPICS: A Framework for Enforcing Security Policies in Composite Web Services.

, , , and . IEEE Trans. Serv. Comput., 12 (3): 415-428 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks., , , , , and . J. Netw. Comput. Appl., (2014)RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions., , and . IEEE Access, (2019)Adaptable Safety and Security in V2X Systems., , and . ICIOT, page 17-24. IEEE Computer Society, (2017)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)An End-to-End Security Auditing Approach for Service Oriented Architectures., , , , , , , and . SRDS, page 279-284. IEEE Computer Society, (2012)Machine Learning Models to Enhance the Science of Cognitive Autonomy., , , , , and . AIKE, page 46-53. IEEE Computer Society, (2018)Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks., , , , , and . SRDS Workshop, page 57-61. IEEE Computer Society, (2015)Real-time Mobile-Cloud Computing for Context- Aware Blind Navigation.. Int. J. Next Gener. Comput., (2011)I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains., , and . Turkish J. Electr. Eng. Comput. Sci., 27 (5): 3713-3728 (2019)ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security., , and . Trans. Emerg. Telecommun. Technol., (2021)