Author of the publication

Using web service enhancements to bridge business trust relationships.

, and . PST, volume 380 of ACM International Conference Proceeding Series, page 35. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contingency management under asymmetric information., , and . Oper. Res. Lett., 33 (6): 572-580 (2005)Dynamic policy conflict analysis for collaborative web services., and . CNSM, page 338-341. IEEE, (2010)Editorial: Special Issue in Privacy, Security and Trust for Mobile Systems., and . Wireless Personal Communications, 73 (1): 1-3 (2013)The Newsvendor Problem with Advertising Revenue., , and . Manuf. Serv. Oper. Manag., 13 (3): 281-296 (2011)Price discount and capacity planning under demand postponement with opaque selling., and . Decis. Support Syst., (2015)Using Web Service Enhancements to Establish Trust Relationships with Privacy Protection (Extended and Invited from ICWS 2006 with id 47)., and . Int. J. Web Serv. Res., 6 (1): 49-68 (2009)When do firms benefit from joint price and lead-time competition?, , and . Eur. J. Oper. Res., 302 (2): 497-517 (2022)Optimized Complex Network Method (OCNM) for Improving Accuracy of Measuring Human Attention in Single-Electrode Neurofeedback System., , , , and . Comput. Intell. Neurosci., (2019)Access Control and Resource Allocation for Peer-to-Peer Video Streaming Based on Fuzzy Logic., and . WSC, volume 75 of Advances in Intelligent and Soft Computing, page 237-244. Springer, (2009)WNN-based Fast Event Pattern Detection and Prediction Using Reversed Pattern Tree for Cloud System Reliability Management., and . ICMLA, page 661-666. IEEE, (2015)