Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Computing Model for Securing Mobile Agents in IP Networks., , and . IoTBDS, page 232-238. SciTePress, (2017)Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks., , and . IEEE Access, (2020)Configuring storage-area networks using mandatory security., , , and . Journal of Computer Security, 17 (2): 191-210 (2009)An Event-B Approach to Data Sharing Agreements., , , and . IFM, volume 6396 of Lecture Notes in Computer Science, page 28-42. Springer, (2010)SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements., , and . STA, volume 186 of Communications in Computer and Information Science, page 29-36. Springer, (2011)Cloud-based federated identity for the Internet of Things., and . Ann. des Télécommunications, 73 (7-8): 415-427 (2018)Formal Analysis by Abstract Interpretation - Case Studies in Modern Protocols. Springer, (2022)A Study on Human Perception of Document Paragraph Layout., and . IISA, page 1-8. IEEE, (2023)Towards Secure Data Sharing Processes in Online Social Networks: Trusty., , and . ICSOFT, page 418-425. ScitePress, (2020)Epistemology for Cyber Security: A Controlled Natural Language Approach., , and . ICIKS, volume 486 of Lecture Notes in Business Information Processing, page 267-282. Springer, (2023)