Author of the publication

An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems.

, and . COMPSAC (2), page 329-334. IEEE Computer Society, (2009)978-0-7695-3726-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An embedding theorem of hypersemigroups in terms of fuzzy sets., and . FSKD, page 39-42. IEEE, (2012)Regularization Method Combined with Parameter Competitive Criterion for Model-Plant Performance Matching of Aircraft Engine., and . ICICA (1), volume 243 of Communications in Computer and Information Science, page 657-664. Springer, (2011)Evaluation of e-commerce system trustworthiness using multi-criteria analysis., and . MCDM, page 86-93. IEEE, (2014)Effects of forest canopy density and epixylic vegetation on nutrient concentrations in decaying logs of a subalpine fir forest, , , , , , , , and . Forest Ecosystems, (2022)Evaluating Modules in Graph Contrastive Learning., , , , , , and . CoRR, (2021)Automatic Fusion Network for Cold-start CVR Prediction with Explicit Multi-Level Representation., , , , , and . ICDE, page 3440-3452. IEEE, (2023)V2I-aided Tracking Design., , , , and . ICC, page 291-296. IEEE, (2022)An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems., and . COMPSAC (2), page 329-334. IEEE Computer Society, (2009)978-0-7695-3726-9.NeuralClassifier: An Open-source Neural Hierarchical Multi-label Text Classification Toolkit., , , , , , , , and . ACL (3), page 87-92. Association for Computational Linguistics, (2019)Chaotic differential evolution algorithm based on mixed method for large-scale industrial processes of fuzzy model., , , and . ICNC, page 1381-1385. IEEE, (2011)