Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection and Security Issues for Future Systems.. Operating Systems of the 90s and Beyond, volume 563 of Lecture Notes in Computer Science, page 184-201. Springer, (1991)Implementation Issues for E-Commerce.. NDSS, The Internet Society, (1998)Trust based Approach for Improving Data Reliability in Industrial Sensor Networks., and . IFIPTM, volume 238 of IFIP, page 349-365. Springer, (2007)Adaptive trust negotiation and access control., , , , and . SACMAT, page 139-146. ACM, (2005)Integrated Access Control and Intrusion Detection for Web Servers., , , and . ICDCS, page 394-. IEEE Computer Society, (2003)The Prospero File System: A Global File System Based on the Virtual System Model.. Computing Systems, 5 (4): 407-432 (1992)Kerberos: an authentication service for computer networks., and . IEEE Commun. Mag., 32 (9): 33-38 (1994)Resource Management for Distributed Parallel Systems., and . HPDC, page 316-323. IEEE, (1993)Adding Packet Radio to the Ultrix Kernel., and . USENIX Winter, page 303-308. USENIX Association, (1988)The Specification and Enforcement of Advanced Security Policies., and . POLICY, page 128-138. IEEE Computer Society, (2002)