Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrated Framework for Fault Resolution in Business Processes., , , , , and . ICWS, page 266-275. IEEE, (2022)Dependencies and separation of duty constraints in GTRBAC., , , and . SACMAT, page 51-64. ACM, (2003)Wireless network resource management for Web-based multimedia document services., , , , and . IEEE Communications Magazine, 41 (3): 138-145 (2003)Incorporating Privacy into the Undergraduate Curriculum., , , and . InfoSecCD, page 1-7. ACM, (2013)Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints., , , and . ICDE, page 119. IEEE Computer Society, (2006)Privacy-preserving trust verification., , , and . SACMAT, page 139-148. ACM, (2010)A Role-Based Access Control Policy Verification Framework for Real-Time Systems., , , and . WORDS, page 13-20. IEEE Computer Society, (2005)Privacy-Preserving Tabu Search for Distributed Graph Coloring., , , and . SocialCom/PASSAT, page 951-958. IEEE Computer Society, (2011)Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN., , , , and . Symposium on Object-Oriented Real-Time Distributed Computing, page 386-393. IEEE Computer Society, (2002)Emergency response plan recommendation and composition system (ERPRCS)., , , , , and . DG.O, page 41:1-41:10. ACM, (2018)