Author of the publication

Security Controls in Collaborative Business Processes.

, , and . PRO-VE, volume 186 of IFIP, page 247-254. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting the Firewall Abolition Act., and . HICSS, page 206. IEEE Computer Society, (2003)Extensible Security Patterns.. DEXA Workshops, page 729-733. IEEE Computer Society, (2007)Towards automated business-driven indication and mitigation of VM sprawl in Cloud supply chains., , , and . Integrated Network Management, page 1062-1065. IEEE, (2011)Dynamic SLA management with forecasting using multi-objective optimization., , and . IM, page 457-463. IEEE, (2013)SLA-driven predictive orchestration for distributed cloud-based mobile services., , , and . ICC Workshops, page 738-743. IEEE, (2013)AwareCon: Situation Aware Context Communication., , , , and . UbiComp, volume 2864 of Lecture Notes in Computer Science, page 132-139. Springer, (2003)Audio-Visual Embodied Navigation., , , , , , , and . CoRR, (2019)Towards Trust Relationship Planning for Virtual Organizations., , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 355-361. Springer, (2004)From Business Process Choreography to Authorization Policies., , and . DBSec, volume 4127 of Lecture Notes in Computer Science, page 297-309. Springer, (2006)Effects of virtual acoustics on target-word identification performance in multi-talker environments., , , , , and . SAP, page 16:1-16:8. ACM, (2018)