From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Conceptual Framework for Unified and Comprehensive SOA Management., , , и . ICSOC Workshops, том 5472 из Lecture Notes in Computer Science, стр. 28-40. Springer, (2008)Propagation of Data Protection Requirements in Multi-stakeholder Web Services Systems., , , и . WISE, том 6488 из Lecture Notes in Computer Science, стр. 67-76. Springer, (2010)Getting the Job Done in a Hostile Environment., и . Australian Joint Conference on Artificial Intelligence, том 2256 из Lecture Notes in Computer Science, стр. 507-518. Springer, (2001)Protecting data in multi-stakeholder web service system., , , и . WWW, стр. 1163-1164. ACM, (2010)Differentiating malware from cleanware using behavioural analysis., , , и . MALWARE, стр. 23-30. IEEE Computer Society, (2010)Function length as a tool for malware classification., , и . MALWARE, стр. 69-76. IEEE Computer Society, (2008)An automated classification system based on the strings of trojan and virus families., , , и . MALWARE, стр. 23-30. IEEE Computer Society, (2009)RoleVAT: Visual Assessment of Practical Need for Role Based Access Control., , , и . ACSAC, стр. 13-22. IEEE Computer Society, (2009)Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services., , , и . IEEE CLOUD, стр. 573-581. IEEE Computer Society, (2011)SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies., , , , и . SOCA, стр. 1-10. IEEE Computer Society, (2009)