Author of the publication

Security Requirements of e-Government Services: An Organizational Framework.

, and . PDPTA, page 127-131. CSREA Press, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , and . Communications and Multimedia Security, volume 175 of IFIP, page 209-221. Springer, (2004)A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , and . Comput. Commun., 22 (8): 697-709 (1999)Towards a framework for evaluating certificate status information mechanisms., , , , , and . Comput. Commun., 26 (16): 1839-1850 (2003)A generic accounting scheme for next generation networks., , and . Comput. Networks, 53 (14): 2408-2426 (2009)Addressing privacy requirements in system design: the PriS method., , and . Requir. Eng., 13 (3): 241-255 (2008)A framework for designing cloud forensic-enabled services (CFeS)., , , and . Requir. Eng., 24 (3): 403-430 (2019)A framework for identity privacy in SIP., , , and . J. Netw. Comput. Appl., 33 (1): 16-28 (2010)A soft computing approach for privacy requirements engineering: The PriS framework., , and . Appl. Soft Comput., 11 (7): 4341-4348 (2011)Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks., , and . IEEE Commun. Surv. Tutorials, 9 (1-4): 18-28 (2007)