Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems., , , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 253-271. Springer, (2007)An Infrastructure Virtualisation SOA for VNO-based Business Models., , , , and . IEEE SCC, page 44-51. IEEE Computer Society, (2007)Virtual Storage Services for Dynamic Collaborations., , , , and . WETICE, page 186-191. IEEE Computer Society, (2007)Secure and Conditional Resource Coordination for Successful Collaborations., , , , , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-303. Springer / ICST, (2008)User-Controlled Collaborations in the Context of Trust Extended Environments., , , , , and . WETICE, page 389-394. IEEE Computer Society, (2007)Packet Pacing in Short Buffer Optical Packet Switched Networks., , , and . INFOCOM, IEEE, (2006)A snapshot of trusted personal devices applicable to transaction processing., , , and . Personal and Ubiquitous Computing, 14 (4): 347-361 (2010)Yet Another Performance Testing Framework., , , and . Australian Software Engineering Conference, page 170-179. IEEE Computer Society, (2008)Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets., , , , and . WETICE, page 313-318. IEEE Computer Society, (2006)Enhancing the diversity of a corporate database using chemical database clustering and analysis., , , , and . J. Comput. Aided Mol. Des., 9 (5): 407-416 (1995)