Author of the publication

Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions.

, , , and . SERVICES, page 645-652. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-interactive Public Accountability for Sanitizable Signatures., , and . EuroPKI, volume 7868 of Lecture Notes in Computer Science, page 178-193. Springer, (2012)Redactable Signatures for Independent Removal of Structure and Content., , , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 17-33. Springer, (2012)On the Relation between Redactable and Sanitizable Signature Schemes., , , and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 113-130. Springer, (2014)Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.. IFIPTM, volume 401 of IFIP Advances in Information and Communication Technology, page 136-150. Springer, (2013)On Updatable Redactable Signatures., and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 457-475. Springer, (2014)On Structural Signatures for Tree Data Structures., , , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 171-187. Springer, (2012)Scope of Security Properties of Sanitizable Signatures Revisited., , , and . ARES, page 188-197. IEEE Computer Society, (2013)Smartcard Firewalls Revisited., and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 179-191. Springer, (2006)Authenticity: The missing link in the social semantic web., and . GI Jahrestagung (2), volume P-134 of LNI, page 943-948. GI, (2008)ConCert: Content Revocation Using Certificates.. Sicherheit, volume P-128 of LNI, page 149-162. GI, (2008)