Author of the publication

Collaborative Coordination of Activities with Temporal Dependencies.

, , and . OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, page 186-203. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Organizational Patterns for Security and Dependability: From Design to Application., , , , , , , , , and . IJSSE, 2 (3): 1-22 (2011)A Security Pattern for Untraceable Secret Handshakes., , , , and . SECURWARE, page 8-14. IEEE Computer Society, (2009)Achieving Socio-technical Confidentiality Using Security Pattern in Smart Homes., , , and . FGCN (2), page 447-452. IEEE Computer Society, (2008)978-0-7695-3431-2.How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , and . ICAIL, page 149-153. ACM, (2007)Framework for coordination of activities in dynamic situations., , and . Enterprise IS, 7 (1): 33-60 (2013)S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System., , , , and . Electron. Notes Theor. Comput. Sci., (2009)An Ontological Interface for Software Developers to Select Security Patterns., , , and . DEXA Workshops, page 297-301. IEEE Computer Society, (2008)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns., , , , and . Artif. Intell. Law, 17 (1): 1-30 (2009)A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application., , , and . Trans. Computational Science, (2010)Collaborative Coordination of Activities with Temporal Dependencies., , and . OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, page 186-203. Springer, (2010)