Author of the publication

An Architecture for Implementing 'Collaborative Usage Control' Policy - Toward End-to-End Security Management in Collaborative Computing.

, and . ICEIS (2), page 291-294. SciTePress, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A sensor node scheduling algorithm for heterogeneous wireless sensor networks., , , , , and . IJDSN, (2019)Originator usage control with business process slicing, and . CoRR, (2012)Service Call Graph (SCG) - Information Flow Analysis in Web Service Composition., and . ICEIS (2), page 17-24. SciTePress, (2013)End-to-end security policy description and management for collaborative system., and . IAS, page 137-142. IEEE, (2010)A Governance Framework for Mitigating Risks and Uncertainty in Collaborative Business Processes., , and . PRO-VE, volume 380 of IFIP Advances in Information and Communication Technology, page 667-674. Springer, (2012)Short-Time Traffic State Forecasting Using Adaptive Neighborhood Selection Based on Expansion Strategy., , , , , and . IEEE Access, (2018)On attribute-based usage control policy ratification for cooperative computing context, and . CoRR, (2013)Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification., and . ICEIS, volume 190 of Lecture Notes in Business Information Processing, page 226-241. Springer, (2013)Toward Comprehensive Security Policy Governance in Collaborative Enterprise., and . APMS, volume 384 of IFIP Advances in Information and Communication Technology, page 350-358. Springer, (2011)Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing., , , , , and . IEEE Trans. Big Data, 8 (1): 35-47 (2022)