Author of the publication

ETIS - Efficient Trust and Identity Management System for Federated Service Providers.

, , and . AINA, page 219-226. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model., , , and . Int. J. Cooperative Inf. Syst., 10 (1-2): 1-50 (2001)Formalization of Linear Hash Structures Using Nested Transactions and I/O Automation Model., , and . IADT, page 521-530. Society for Design and Process Science, 1302 West 25th Street, Suite 300, Austin, TX 78705-4236, USA, (1998)Top-k query processing in mobile-P2P networks using economic incentive schemes., , and . Peer-to-Peer Netw. Appl., 9 (4): 731-751 (2016)Security Frameworks in Mobile Cloud Computing., , and . Handbook of Computer Networks and Cyber Security, Springer, (2020)Sensor Cloud: A Cloud of Sensor Networks.. ICDCS, page 2660-2661. IEEE Computer Society, (2017)Association Rules for Web Data Mining in WHOWEDA., , , and . Kyoto International Conference on Digital Libraries, page 127-139. IEEE Computer Society, (2000)An adaptable constrained locking protocol for high data contention environments: correctness and performance., , and . Inf. Softw. Technol., 42 (9): 599-608 (2000)Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks., , , and . Comput. Commun., 36 (8): 861-874 (2013)A Transaction Model to Improve Data Availability in Mobile Computing., and . Distributed Parallel Databases, 10 (2): 127-160 (2001)Incentive based approach to find selfish nodes in Mobile P2P networks., , and . IPCCC, page 352-359. IEEE Computer Society, (2012)