Author of the publication

Dynamic Authentication for Cross-Realm SOA-Based Business Processes.

, , , and . IEEE Trans. Services Computing, 5 (1): 20-32 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data., and . International Journal of Software Engineering and Knowledge Engineering, 24 (7): 1091- (2014)A Personalized Privacy Preserving Method for Publishing Social Network Data., , and . TAMC, volume 8402 of Lecture Notes in Computer Science, page 141-157. Springer, (2014)Automated synthesis of composite services with correctness guarantee., , , , and . WWW, page 1127-1128. ACM, (2009)Mining Item Popularity for Recommender Systems., , , and . ADMA (2), volume 8347 of Lecture Notes in Computer Science, page 372-383. Springer, (2013)Efficient Non-Repudiation Multicast Source Authentication Schemes., and . J. Comput. Sci. Technol., 17 (6): 820-829 (2002)A Software Protocol of Goals and Operations Based on BDI Model., , , , and . SUTC (1), page 454-461. IEEE Computer Society, (2006)An Improved Privacy Preserving Algorithm for Publishing Social Network Data., and . HPCC/EUC, page 888-895. IEEE, (2013)Two privacy-preserving approaches for data publishing with identity reservation., , , and . Knowl. Inf. Syst., 60 (2): 1039-1080 (2019)A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory., , , , and . Symmetry, 10 (8): 333 (2018)A three-phase approach to differentially private crucial patterns mining over data streams., , , , and . Computers & Security, (2019)