Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk assessment in work environments: modeling and simulation., , and . Concurrency and Computation: Practice and Experience, 24 (18): 2381-2403 (2012)Assessing Business Process Security Awareness: A Service-Oriented Approach., , and . AMCIS, page 89. Association for Information Systems, (2007)ACTEN: A conceptual model for security systems design., and . Computers & Security, 3 (3): 196-214 (1984)Web2Touch Track Report: 5th Track on Modeling the Collaborative Web Knowledge., , , and . WETICE, page 429-431. IEEE Computer Society, (2012)A Framework for Using Web Services to Enhance QoS for Content Delivery., , , , , , , , , and 2 other author(s). IEEE MultiMedia, 16 (1): 26-35 (2009)Report of the 1st International Workshop on Context-aware Autonomous and Smart Architectures (email protected 2017)., , , , , , and . ACM SIGSOFT Software Engineering Notes, 43 (4): 52-53 (2018)Report of the 1st International Workshop on Context-aware Autonomous and Smart Architectures (email protected 2017)., , , , , , and . ACM SIGSOFT Software Engineering Notes, 43 (4): 24-27 (2018)WS-DIAMOND: An Approach to Web Services - Monitoring and Diagnosis., and . ERCIM News, (2007)Methodology for Green Certificates of Service Applications., and . WETICE, page 474-479. IEEE Computer Society, (2012)A web-based cooperative tool for risk management with adaptive security., , and . Future Generation Comp. Syst., (2016)