Author of the publication

Authorization schemes for large-scale systems based on Java, CORBA and Web security models.

, and . ICON, page 327-334. IEEE, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security., , , , and . SEC, volume 214 of IFIP Conference Proceedings, page 263-274. Kluwer, (2002)Reconfigurable Scalable State Machine Replication., , and . LADC, page 1-8. IEEE Computer Society, (2016)A Semi-reliable Multicast Protocol for Distributed Multimedia Applications in Large Scale Networks., , , , and . MMNS, volume 3754 of Lecture Notes in Computer Science, page 109-120. Springer, (2005)A New Approach for IDS Composition., , and . ICC, page 2195-2200. IEEE, (2006)A Programming Model for Real-Time Applications in Open Distributed Systems., , , , and . FTDCS, page 104-111. IEEE Computer Society, (1995)A Distributed IDS for Ad Hoc Networks., , and . AINA Workshops, page 478-483. IEEE Computer Society, (2012)MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA., , and . SCCC, page 25-34. IEEE Computer Society, (1999)Implementing replicated services in open systems using a reflective approach., , , and . ISADS, page 273-280. IEEE Computer Society, (1997)HRM Smart Contracts on the Blockchain., , , and . ISCC, page 1-6. IEEE, (2019)Adapting the FT-CORBA Replication Management Service for Large-scale Distributed Systems., and . ACIS-ICIS, page 652-657. IEEE Computer Society, (2007)