Author of the publication

Generation of Standardised Rights Expressions from Contracts: An Ontology Approach?

, , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 836-845. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overview of the MPEG-21 Media Contract Ontology., , , , and . Semantic Web, 7 (3): 311-332 (2016)Approaching the rights management interoperability problem using intelligent brokerage mechanisms., , and . Comput. Commun., 34 (2): 129-139 (2011)Protecting Notification of Events in Multimedia Systems., , and . WOSIS, page 153-162. INSTICC Press, (2006)Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework., , , , , and . J. Netw. Syst. Manag., 31 (2): 33 (April 2023)A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things., , and . Sensors, 23 (3): 1252 (February 2023)VITAMIN-V: Virtual Environment and Tool-Boxing for Trustworthy Development of RISC-V Based Cloud Services., , , , , , , , , and 14 other author(s). DSD, page 302-308. IEEE, (2023)Architecture and Protocols for the Protection and Management of Multimedia Information., , , and . MIPS, volume 3311 of Lecture Notes in Computer Science, page 252-263. Springer, (2004)Implementing Mobile Applications with the MIPAMS Content Management Platform., , , and . MobiMedia, volume 79 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 266-280. Springer, (2011)Towards the Interoperability between MPEG-21 REL and Creative Commons Licenses., and . AXMEDIS, page 45-52. IEEE Computer Society, (2006)Generation of Standardised Rights Expressions from Contracts: An Ontology Approach?, , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 836-845. Springer, (2005)