Author of the publication

Security for middleware extensions: event meta-data for enforcing security policy.

, and . Middleware Security, page 31-33. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security for middleware extensions: event meta-data for enforcing security policy., and . Middleware Security, page 31-33. ACM, (2008)Machine learning to guide the use of adjuvant therapies for breast cancer., , , , and . Nat. Mach. Intell., 3 (8): 716-726 (2021)Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control., and . WPES, page 20-26. ACM, (2005)Identification of Patient Prescribing Predicting Cancer Diagnosis Using Boosted Decision Trees., , , , , , , , , and 1 other author(s). AIME, volume 11526 of Lecture Notes in Computer Science, page 328-333. Springer, (2019)Learning Dynamic and Personalized Comorbidity Networks from Event Data using Deep Diffusion Processes., , , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 3295-3305. PMLR, (2020)Outcome-Oriented Deep Temporal Phenotyping of Disease Progression., , and . IEEE Trans. Biomed. Eng., 68 (8): 2423-2434 (2021)Traceability and Timeliness in Messaging Middleware., and . OTM Workshops (2), volume 4278 of Lecture Notes in Computer Science, page 1551-1554. Springer, (2006)Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications., and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 3-4. Springer, (2006)