Author of the publication

A Conceptual Framework for Metadata Quality Assessment

, , , and . International Conference on Dublin Core and Metadata Applications, 0 (0): 104--113 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deploying Privacy Improved RBAC in Web Information Systems.. IJITSA, 4 (2): 70-87 (2011)Security policy verification for multi-domains in cloud systems., , and . Int. J. Inf. Sec., 13 (2): 97-111 (2014)A Study on User Behavior and Acceptance of Electronic Banking Services., and . Panhellenic Conference on Informatics, page 180-183. IEEE Computer Society, (2010)Supporting dynamic administration of RBAC in web-based collaborative applications during run-time., , , , and . IJICS, 2 (4): 328-352 (2008)Web services and multimedia in m-business applications: Opportunities and concerns., , , and . IJWIS, 2 (1): 51-62 (2006)Utilizing Survival Analysis for Modeling Child Hazards of Social Networking., and . HAISA, page 195-204. University of Plymouth, (2012)A Fine-Grained Metric System for the Completeness of Metadata., , , and . MTSR, volume 46 of Communications in Computer and Information Science, page 83-94. Springer, (2009)Access Control Issues in Utilizing Fog Computing for Transport Infrastructure., , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 15-26. Springer, (2015)eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features., , and . DBSec, volume 171 of IFIP Conference Proceedings, page 63-78. Kluwer, (1999)X-EDCA: A cross-layer MAC-centric mechanism for efficient multimedia transmission in congested IEEE 802.11e infrastructure networks., , , and . IWCMC, page 1724-1730. IEEE, (2011)