Author of the publication

A scale based trust model for multi-context environments.

, , and . Computers & Mathematics with Applications, 60 (2): 209-216 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Systems Journal, 10 (3): 912-921 (2016)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , and . Entropy, 20 (1): 77 (2018)A metadata-based access control model for web services., , and . Internet Research, 15 (1): 99-116 (2005)Why have public key infrastructures failed so far?, , and . Internet Research, 15 (5): 544-556 (2005)A scale based trust model for multi-context environments., , and . Computers & Mathematics with Applications, 60 (2): 209-216 (2010)Non-repudiation protocols for multiple entities., , and . Computer Communications, 27 (16): 1608-1616 (2004)Intermediary Non-repudiation Protocols., , , and . CEC, page 207-214. IEEE Computer Society, (2003)Analysis of a Free Roaming Agent Result-Truncation Defense Scheme., , and . CEC, page 221-226. IEEE Computer Society, (2004)On Secure Profiling., , and . DEXA Workshops, page 214-218. IEEE Computer Society, (2005)