Author of the publication

A technical architecture for enforcing usage control requirements in service-oriented architectures.

, , , , , , and . SWS, page 18-25. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Research Citations (CRC)., , , , , and . CLBib@ISSI, volume 1384 of CEUR Workshop Proceedings, page 18-27. CEUR-WS.org, (2015)A Dual Head Clustering Mechanism for Energy Efficient WSNs., and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-387. Springer, (2010)Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing., , , , , and . CoRR, (2019)Fiden: Intelligent Fingerprint Learning for Attacker Identification in the Industrial Internet of Things., , , and . IEEE Trans. Ind. Informatics, 17 (2): 882-890 (2021)Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms., , , , and . Future Gener. Comput. Syst., (2019)An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network., , , , , and . Mob. Networks Appl., 24 (4): 1295-1305 (2019)Editorial: Securing Internet of Things Through Big Data Analytics., , , and . Mob. Networks Appl., 24 (4): 1265-1268 (2019)Two-Stage History Matching for Hydrology Models via Machine Learning., , and . SocProS (2), volume 1139 of Advances in Intelligent Systems and Computing, page 83-95. Springer, (2019)Towards Reliable Wireless Vehicular Communications., , , , , and . ITSC, page 167-172. IEEE, (2015)Modeling permissions in a (U/X)ML world., , and . ARES, page 685-692. IEEE Computer Society, (2006)