Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Composition of Web Services Using Wrappers., and . ISoLA, volume 17 of Communications in Computer and Information Science, page 862-865. Springer, (2008)Formal Z Specifications of Several Flat Role-Based Access Control Models., and . SEW, page 282-292. IEEE Computer Society, (2006)Abstractions of Web Services., and . ICECCS, page 182-191. IEEE Computer Society, (2009)Threat modeling approaches and tools for securing architectural designs of an e-banking application., and . IAS, page 149-154. IEEE, (2010)Formal Modelling of a Usable Identity Management Solution for Virtual Organisations, , , , , , and . FAVO, volume 16 of EPTCS, page 41-50. (2009)An Integrated CSP-Based Tool for the Visualisation, Animation and Performance Evaluation of Message Passing Algorithms., and . ICFEM, page 189-198. IEEE Computer Society, (2000)A Graphical Tool for the Visualization and Animation of Communicating Sequential Processes.. Euro-Par, volume 1470 of Lecture Notes in Computer Science, page 165-172. Springer, (1998)A Trust Management Framework for Network Applications within an SDN Environment., , and . AINA Workshops, page 93-98. IEEE Computer Society, (2017)Audited credential delegation - a user-centric identity management solution for computational grid environments., , , , and . IAS, page 222-227. IEEE, (2010)A Functional View of Parallel Computer Graphics., and . AICCSA, page 242-. IEEE Computer Society, (2001)