Author of the publication

A quantification model using P3P in privacy control for telecommunications service management.

, , and . Int. J. Serv. Stand., 1 (4): 426-445 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The pricing of wireless phone services in the USA: issues and development trends., , and . IJMC, 5 (2): 169-185 (2007)RFID Implementation and Security Issues., , and . ISA, volume 200 of Communications in Computer and Information Science, page 236-249. Springer, (2011)Security Implication in Virtualization., , , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management., , , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 360-369. Springer, (2009)State of the Art of Network Security Perspectives in Cloud Computing., , , , , and . SUComS, volume 78 of Communications in Computer and Information Science, page 629-637. Springer, (2010)Applications of ''human factors'' in wireless telecommunications service delivery., , , , and . Int. J. Serv. Stand., 1 (3): 287-298 (2005)Security management in Wireless Sensor Networks for healthcare., , , and . Int. J. Mob. Commun., 9 (2): 187-207 (2011)Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen., , and . ICSSA, page 20-24. IEEE, (2017)A connection-oriented telecommunications disaster management model using mobile GIS., , and . Int. J. Mob. Commun., 4 (1): 63-81 (2006)International telecommunications service management., , and . Int. J. Serv. Stand., 2 (3): 257-272 (2006)