Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Service Coordination (WS-Coordination), , , , , , , , , and 3 other author(s). BEA Systems, International Business Machines Corporation, Microsoft Corporation Inc., (November 2004)Web Services Atomic Transaction (WS-AtomicTransaction), , , , , , , , , and 3 other author(s). BEA Systems, International Business Machines Corporation, Microsoft Corporation Inc., (November 2004)Security Challenges, Threats, and Countermeasures Version 1.0, , , , , , and . Web Services Interoperability Organization, (2005)An autonomic approach for managing security and identity management policies in enterprises., , , and . J. High Speed Networks, 15 (3): 291-300 (2006)OAuth 2.0 Token Exchange., , , , and . RFC, (January 2020)Securing service-oriented applications., , and . ISSE, page 336-343. Vieweg, (2006)Business-driven application security: From modeling to managing secure applications., , , , and . IBM Syst. J., 44 (4): 847-868 (2005)Security challenges for Enterprise Java in an e-business environment., , , , and . IBM Syst. J., 40 (1): 130-152 (2001)Push-Based Security Event Token (SET) Delivery Using HTTP., , , , and . RFC, (November 2020)Concise Binary Object Representation (CBOR) Tags for Date., , and . RFC, (November 2020)