Author of the publication

A security policy framework for context-aware and user preferences in e-services.

, , and . Journal of Systems Architecture - Embedded Systems Design, 55 (4): 275-288 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sliman, Layth
add a person with the name Sliman, Layth
 

Other publications of authors with the same name

A security policy framework for context-aware and user preferences in e-services., , and . Journal of Systems Architecture - Embedded Systems Design, 55 (4): 275-288 (2009)Semantic Web Technologies in Cloud Computing: A Systematic Literature Review., , , , and . SCC, page 744-751. IEEE Computer Society, (2016)Trustless Blockchain-based Access Control in Dynamic Collaboration., , , and . BDCSIntell, volume 2343 of CEUR Workshop Proceedings, page 27-33. CEUR-WS.org, (2018)Configuration assistée des processus métier. Conception et expérimentation., , , and . Ingénierie des Systèmes d'Information, 20 (6): 59-78 (2015)A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud., , , , and . OTM Conferences (1), volume 10573 of Lecture Notes in Computer Science, page 732-750. Springer, (2017)Compose: A Domain Specific Language for scientific code computation., , , and . CFIP/NOTERE, page 1-4. IEEE, (2015)Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018)., and . WETICE, page 179-180. IEEE Computer Society, (2018)A Critical Comparison of Fingerprint Fuzzy Vault Techniques., , , , , , and . IVIC, volume 9429 of Lecture Notes in Computer Science, page 178-188. Springer, (2015)Distributed Framework for Big Data Processing: a Goal Driven Approach., , and . IDT/IIMSS/STET, volume 262 of Frontiers in Artificial Intelligence and Applications, page 385-391. IOS Press, (2014)Optimized multi-biometric enhancement analysis., , , and . IET Biom., 10 (3): 326-341 (2021)