Author of the publication

A scale based trust model for multi-context environments.

, , and . Computers & Mathematics with Applications, 60 (2): 209-216 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OSAMI Commons - An open dynamic services platform for ambient intelligence., , , , , , , , , and 1 other author(s). ETFA, page 1-10. IEEE, (2011)Escrowed decryption protocols for lawful interception of encrypted data., , and . IET Information Security, 13 (5): 498-507 (2019)Enabling Attribute Delegation in Ubiquitous Environments., , and . MONET, 13 (3-4): 398-410 (2008)A Representation Model of Trust Relationships with Delegation Extensions., , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 116-130. Springer, (2005)Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services., , and . CloudCom, page 241-248. IEEE Computer Society, (2012)NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU., , and . AsiaCCS, page 179-189. ACM, (2015)An Evolutionary Trust and Distrust Model., , and . Electron. Notes Theor. Comput. Sci., (2009)A scale based trust model for multi-context environments., , and . Computers & Mathematics with Applications, 60 (2): 209-216 (2010)Secure Real-Time Integration of Services in a OSGi Distributed Environment., , and . NCM (1), page 631-635. IEEE Computer Society, (2008)On the application of generic CCA-secure transformations to proxy re-encryption., , and . Security and Communication Networks, 9 (12): 1769-1785 (2016)