Author of the publication

Static verification of security requirements in role based CSCW systems.

, and . SACMAT, page 196-203. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bacterial Chemotaxis in Linear and Nonlinear Steady Microfluidic Gradients, , and . Nano Letters, 10 (9): 3379-3385 (2010)A specification model for context-based collaborative applications., , and . Pervasive Mob. Comput., 1 (1): 21-42 (2005)Automatic Electric Meter Reading System: A Cost-Feasible Alternative Approach In Meter Reading For Bangladesh Perspective Using Low-Cost Digital Wattmeter And Wimax Technology, , , and . CoRR, (2012)Exception Handling in CSCW Applications in Pervasive Computing Environments., , and . Advanced Topics in Exception Handling Techniques, volume 4119 of Lecture Notes in Computer Science, page 161-180. Springer, (2006)Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system., , , , , , and . Softw. Pract. Exp., 37 (5): 493-522 (2007)Experiences and future challenges in mobile agent programming., , and . Microprocess. Microsystems, 25 (2): 121-129 (2001)Security Policies in Distributed CSCW and Workflow Systems., and . IEEE Trans. Syst. Man Cybern. Part A, 40 (6): 1220-1231 (2010)A New Compression Based Index Structure for Efficient Information Retrieval, , , , and . CoRR, (2012)A Generative Programming Framework for Context-Aware CSCW Applications., , and . ACM Trans. Softw. Eng. Methodol., 21 (2): 11:1-11:35 (2012)Mobile Agent Programming in Ajanta., , , , and . ICDCS, page 190-197. IEEE Computer Society, (1999)