Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Solution of Non-Homogeneous Markov Processes through Uniformization., and . ESM, page 710-717. SCS Europe, (1998)Web Services Management Network: An Overlay Network for Federated Service Management., , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 351-364. Kluwer, (2003)The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA.. SRDS, page 274-285. IEEE Computer Society, (1999)UltraSAN version 3 overview., , , , and . PNPM, page 216-217. IEEE, (1995)A Formal Model for Soft Enforcement: Influencing the Decision-Maker., , , and . STM, volume 8743 of Lecture Notes in Computer Science, page 113-128. Springer, (2014)DOA 2007 PC Co-chairs' Message., , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 437. Springer, (2007)The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies., , and . ISAS, volume 5017 of Lecture Notes in Computer Science, page 43-58. Springer, (2008)User-managed access to web resources., , , and . Digital Identity Management, page 35-44. ACM, (2010)The Role of Agreements in IT Management Software., , and . WADS, volume 3549 of Lecture Notes in Computer Science, page 36-58. Springer, (2004)Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?, , , and . IEEE Security & Privacy, 15 (2): 78-86 (2017)