Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Implications of Internet-based Information Technology in Value Chain Management., and . IJISSCM, 8 (2): 1-13 (2015)Vulnerability distribution scoring for software product security assessment.. IJICS, 6 (3): 270-285 (2014)IANOS: An Intelligent Application Oriented Scheduling Framework For An HPCN Grid., , , , , , and . CoreGRID Integration Workshop, page 237-248. Springer, (2008)Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation., and . CSIE (1), page 150-154. IEEE Computer Society, (2009)Adaptive Risk-Aware Application-Level Access Control., and . Security and Management, page 10-16. CSREA Press, (2009)Demonstration of the SmartLM License Management Technology for Distributed Computing Infrastructures., , , and . ServiceWave, volume 6481 of Lecture Notes in Computer Science, page 191-192. Springer, (2010)Data and infrastructure security auditing in cloud computing environments.. Int J. Information Management, 34 (3): 364-368 (2014)An Information Model for Security Integration., and . FTDCS, page 41-47. IEEE Computer Society, (2007)Near-Real-Time Cloud Auditing for Rapid Response., , , , and . AINA Workshops, page 1252-1257. IEEE Computer Society, (2012)SCAI-VHTS - A Fully Automated Virtual High Throughput Screening Framework., , , , and . ERCIM News, 2010 (82): 23-24 (2010)