Author of the publication

Data concealing of supply chain transactions using the Distributed Trust Backbone.

, , , and . ICITST, page 151-156. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meta-level selection techniques for the control of default reasoning., , and . Future Generation Comp. Syst., 12 (2-3): 189-201 (1996)Realising collaborative government-to-business business models: the case of the authorised economic operator., and . EG, 7 (4): 330-345 (2010)Diagnosis and Decision Making in Normative Reasoning., and . Artif. Intell. Law, 7 (1): 51-67 (1999)Electronic Contract Drafting Based on Risk and Trust Assessment., and . Int. J. Electronic Commerce, 7 (4): 55-71 (2003)A Logical Model of Directed Obligations and Permissions to Support Electronic Contracting., and . Int. J. Electronic Commerce, 3 (2): 87-104 (1998)On Lean Messaging with Unfolding and Unwrapping for Electronic Commerce., and . Int. J. Electronic Commerce, 5 (1): 83-108 (2000)Enhancing Visibility in International Supply Chains: The Data Pipeline Concept., , , , , , and . IJEGR, 8 (4): 14-33 (2012)Modeling the Dynamics of Transferable Obligations in Business Procedures., and . HICSS (4), page 494-501. IEEE Computer Society, (1997)Deontic and Diagnostic Reasoning., and . ICLP Workshop: Legal Application of Logic Programming, (1994)IT enabled redesign of export procedure for high-value pharmaceutical product under temperature control: the case of drug living lab., , and . DG.O, page 4-13. Digital Government Research Center, (2010)