Author of the publication

An Event-B Approach to Data Sharing Agreements.

, , , and . IFM, volume 6396 of Lecture Notes in Computer Science, page 28-42. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Based Refinement of Security Policies in Collaborative Virtual Organisations., , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 1-14. Springer, (2011)Modelling and Analysis of PKI-Based Systems Using Process Calculi., and . Int. J. Found. Comput. Sci., 18 (3): 593-618 (2007)Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks., , and . SNAMS, page 189-195. IEEE, (2019)Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs)., , and . IEEE Conf. on Intelligent Systems, page 31-37. IEEE, (2020)Reputation management in collaborative computing systems., , and . Secur. Commun. Networks, 3 (6): 546-564 (2010)Verifying a delegation protocol for grid systems., and . Future Gener. Comput. Syst., 27 (5): 476-485 (2011)Correcting a Delegation Protocol for Grids.. TrustBus, volume 6863 of Lecture Notes in Computer Science, page 198-209. Springer, (2011)OAuthing: Privacy-enhancing federation for the Internet of Things., and . CIoT, page 1-6. IEEE, (2016)A Formal Model for Forensic Storage Media Preparation Tools., , and . SECRYPT, page 165-170. SciTePress, (2014)A Utility-Based Reputation Model for the Internet of Things., , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 261-275. Springer, (2016)