Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technology and knowledge: the affirmation of power.. AI Soc., 18 (4): 310-333 (2004)Interaction space theory: a framework for tool development., , , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 427-432. Trinity College Dublin, (2003)Interaction spaces in computer-mediated communication., , , , and . AI Soc., 19 (1): 22-33 (2005)Understanding a Sense of Place in Collaborative Environments.. HCI (9), volume 4558 of Lecture Notes in Computer Science, page 863-872. Springer, (2007)Consumer-Managed Federated Homes., , , , , and . IEEE Communications Magazine, 52 (6): 194-201 (2014)Secure Component Distribution Using WebCom., , and . SEC, volume 214 of IFIP Conference Proceedings, page 387-398. Kluwer, (2002)A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification., , and . IEEE Symposium on Security and Privacy, page 142-153. IEEE Computer Society, (1996)A soft constraint-based approach to the cascade vulnerability problem., , and . Journal of Computer Security, 13 (5): 699-720 (2005)Secure Information Flow Using Security Groups.. CSFW, page 62-72. IEEE Computer Society, (1990)Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores.. ACSAC, page 69-80. IEEE Computer Society, (1997)