Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk assessment in work environments: modeling and simulation., , and . Concurrency and Computation: Practice and Experience, 24 (18): 2381-2403 (2012)Assessing Business Process Security Awareness: A Service-Oriented Approach., , and . AMCIS, page 89. Association for Information Systems, (2007)ACTEN: A conceptual model for security systems design., and . Computers & Security, 3 (3): 196-214 (1984)A Framework for Using Web Services to Enhance QoS for Content Delivery., , , , , , , , , and 2 other author(s). IEEE MultiMedia, 16 (1): 26-35 (2009)Report of the 1st International Workshop on Context-aware Autonomous and Smart Architectures (email protected 2017)., , , , , , and . ACM SIGSOFT Software Engineering Notes, 43 (4): 52-53 (2018)Report of the 1st International Workshop on Context-aware Autonomous and Smart Architectures (email protected 2017)., , , , , , and . ACM SIGSOFT Software Engineering Notes, 43 (4): 24-27 (2018)Web2Touch Track Report: 5th Track on Modeling the Collaborative Web Knowledge., , , and . WETICE, page 429-431. IEEE Computer Society, (2012)Conceptual modeling of authorization in database systems., and . Journal of Systems and Software, 7 (1): 3-13 (1987)Methodology for Green Certificates of Service Applications., and . WETICE, page 474-479. IEEE Computer Society, (2012)WS-DIAMOND: An Approach to Web Services - Monitoring and Diagnosis., and . ERCIM News, (2007)