Author of the publication

Distributed Garbage Collection by Timeouts and Backward Inquiry.

, , and . COMPSAC, page 426-432. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection and Security Issues for Future Systems.. Operating Systems of the 90s and Beyond, volume 563 of Lecture Notes in Computer Science, page 184-201. Springer, (1991)Implementation Issues for E-Commerce.. NDSS, The Internet Society, (1998)Trust based Approach for Improving Data Reliability in Industrial Sensor Networks., and . IFIPTM, volume 238 of IFIP, page 349-365. Springer, (2007)Adaptive trust negotiation and access control., , , , and . SACMAT, page 139-146. ACM, (2005)Integrated Access Control and Intrusion Detection for Web Servers., , , and . ICDCS, page 394-. IEEE Computer Society, (2003)Kerberos: An Authentication Service for Open Network Systems., , and . USENIX Winter, page 191-202. USENIX Association, (1988)Condition-Driven Integration of Security Services.. ACISP, volume 2119 of Lecture Notes in Computer Science, page 176. Springer, (2001)Design, Deployment, and Use of the DETER Testbed., , , , , , , and . DETER, USENIX Association, (2007)A Comparison of Internet Resource Discovery Approaches., , , and . Computing Systems, 5 (4): 461-493 (1992)Proxy-Based Authorization and Accounting for Distributed Systems.. ICDCS, page 283-291. IEEE Computer Society, (1993)