From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

FogProtect: Protecting Sensitive Data in the Computing Continuum., , , , , и . ESOCC Workshops, том 1360 из Communications in Computer and Information Science, стр. 179-184. Springer, (2020)Analysis of XACML policies with ASP., , и . NTMS, стр. 1-5. IEEE, (2015)MDD Approach for the Development of Context-Aware Applications., , и . CONTEXT, том 4635 из Lecture Notes in Computer Science, стр. 15-28. Springer, (2007)Deployment of Component-based Applications on Top of a Context-aware Middleware., , , и . IASTED Conf. on Software Engineering, стр. 414-419. IASTED/ACTA Press, (2005)Dynamic adaptation of CORBA component-based applications., и . SAC, стр. 580-585. ACM, (2007)An Adaptation Methodology for the Deployment of Mobile Component-based Applications., , , и . ICPS, стр. 193-202. IEEE Computer Society, (2006)Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service., , , , , и . ARES, стр. 47:1-47:8. ACM, (2018)Context-Aware Distributed Deployment of Component-Based Applications., , , и . OTM Workshops, том 3292 из Lecture Notes in Computer Science, стр. 36-37. Springer, (2004)ETSI ZSM Driven Security Management in Future Networks., , , , , , , , и . FNWF, стр. 334-339. IEEE, (2022)INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks., , , , , , , , , и 11 other автор(ы). ARES, стр. 105:1-105:10. ACM, (2020)