Author of the publication

Trust Management with Safe Privilege Propagation.

, , , , and . APPT, volume 3756 of Lecture Notes in Computer Science, page 174-183. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Internet File System., , and . DAIS, Chapman & Hall, (1997)Enacting a Software Development Process., , , and . ICECCS, page 3-12. IEEE Computer Society, (1997)A Process-Centered Software Engineering Environment with Network Centric Computing., , and . FTDCS, page 234-239. IEEE Computer Society, (1997)A Proxy-Based Personal Portal., , , and . WebNet, page 913-918. AACE, (1999)Distributed Access Control for Grid Environments Using Trust Management Approach., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 485-495. Springer, (2005)An Overview of the Internet File System., , and . COMPSAC, page 474-477. IEEE Computer Society, (1997)Trust Management with Safe Privilege Propagation., , , , and . APPT, volume 3756 of Lecture Notes in Computer Science, page 174-183. Springer, (2005)iMobile: a proxy-based platform for mobile services., , , and . Wireless Mobile Internet, page 3-10. ACM, (2001)Potential Fraudulent Usage in Mobile Telecommunications Networks., , and . IEEE Trans. Mob. Comput., 1 (2): 123-131 (2002)Entanglement and quantum state transfer between two atoms trapped in two indirectly coupled cavities., , and . Quantum Information Processing, 15 (5): 2181-2191 (2016)