Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral Attestation for Business Processes., , , , and . ICWS, page 343-350. IEEE Computer Society, (2009)Web-Service Based Information Integration for e-Financial Planning System Matchmaking Decision Support., , and . IAT Workshops, page 259-262. IEEE Computer Society, (2006)Dynamic Workflow Generation with Interoperable Security Alerts in MANET., , , and . IEEE SCC, page 418-426. IEEE Computer Society, (2007)A Paradigm for Security Enforcement in CapBasED-AMS., and . CoopIS, page 79-88. IEEE Computer Society, (1997)A New Approach to Describe Web Services., , , and . Web Intelligence, page 568-571. IEEE Computer Society, (2007)Algorithms for Automated Negotiations and Their Applications in Information Privacy., , and . CEC, page 255-262. IEEE Computer Society, (2004)Achieving Survivability in Business Process Execution Language for Web Services (BPEL) with Exception-Flows., , and . EEE, page 68-74. IEEE Computer Society, (2005)Constraint-Based Negotiation in a Multi-Agent Information System with Multiple Platform Support., , , and . HICSS, IEEE Computer Society, (2004)Extending Business Process Execution Language for Web Services with Service Level Agreements Expressed in Computational Quality Attributes., , , and . HICSS, IEEE Computer Society, (2005)End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach., , , , , , , , , and . Information Systems Frontiers, 9 (1): 85-101 (2007)