Author of the publication

The Integration of Corporate Security Strategies in Collaborative Business Processes.

, , and . IEEE Trans. Services Computing, 4 (3): 243-254 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic and Specific Compatibility Criteria for Web Service Composition: Formal Abstraction and Modular Verification Approach1., , and . Int. J. Web Service Res., 9 (4): 45-68 (2012)How do Goals Drive the Engineering of Capacity-Driven Web Services?., , , and . AINA Workshops, page 379-386. IEEE Computer Society, (2010)DAT: Dependency Analysis Tool for Service Based Business Processes., , , and . AINA, page 621-628. IEEE Computer Society, (2014)Formal Abstraction and Compatibility Checking of Web Services., , and . ICWS, page 163-170. IEEE Computer Society, (2013)Formal Modeling of Elastic Service-Based Business Processes., and . IEEE SCC, page 424-431. IEEE Computer Society, (2013)Workflow Semantic Description for Inter-organizational Cooperation., and . Technologies for Collaborative Business Process Management, page 62-71. INSTICC Press, (2006)Monitoring of SCA-based Applications in the Cloud., , and . CLOSER, page 47-57. SciTePress, (2013)Track Report of Provisioning and Management of Service Oriented Architecture and Cloud Computing (PROMASC 2014)., , and . WETICE, page 351-352. IEEE Computer Society, (2014)Correction to "The Integration of Corporate Security Strategies in Collaborative Business Processes"., , and . IEEE Trans. Services Computing, 5 (1): 144 (2012)A recommender system based on historical usage data for web service discovery., , and . Service Oriented Computing and Applications, 6 (1): 51-63 (2012)