Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic transmission of prescriptions: towards realising the dream., and . IJEH, 1 (1): 112-125 (2004)Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure., , and . Communications and Multimedia Security, volume 175 of IFIP, page 251-261. Springer, (2004)Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid., , , , , and . e-Science, page 22. IEEE Computer Society, (2006)Experiences of using a PKI to access a hospital information system by high street opticians., , and . Computer Communications, 26 (16): 1893-1903 (2003)Coordinated decision making in distributed applications.. Inf. Sec. Techn. Report, 12 (3): 147-154 (2007)Authorization Policy Federation in Heterogeneous Multicloud Environments., , and . IEEE Cloud Computing, 4 (4): 38-47 (2017)Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker., , , , , , and . Security and Communication Networks, (2017)Guest editorial: A brief overview of data leakage and insider threats., , , and . Information Systems Frontiers, 15 (1): 1-4 (2013)On the Modeling of Bell-LaPadula Security Policies Using RBAC., and . WETICE, page 257-262. IEEE Computer Society, (2008)Ontology Based Interoperation for Securely Shared Services: Security Concept Matching for Authorization Policy Interoperability., , , , , , , , and . NTMS, page 1-5. IEEE, (2011)