Author of the publication

Modeling Authorization in an SOA based Application Scenario.

, , and . IASTED Conf. on Software Engineering, page 79-84. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Research Citations (CRC)., , , , , and . CLBib@ISSI, volume 1384 of CEUR Workshop Proceedings, page 18-27. CEUR-WS.org, (2015)Light-activated photocurrent degradation and self-healing in perovskite solar cells, , , , , , , , , and 4 other author(s). Nature Communication, (2016)A constraint based role based access control in the SECTET a model-driven approach., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 13. ACM, (2006)Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 44. ACM, (2006)Communication Security in the Internet of Vehicles based Industrial Value Chain., , and . CoRR, (2023)Towards a MOF/QVT-Based Domain Architecture for Model Driven Security., , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 275-290. Springer, (2006)Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS., , , and . CoRR, (2017)Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing., , , and . CoRR, (2019)Dependable wireless communications: applications and practices., , , and . Ann. des Télécommunications, 76 (5-6): 271-272 (2021)Experimental Analysis of the Facial Expression Recognition of Male and Female., , , and . CSAE, page 26:1-26:5. ACM, (2019)