From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preface., и . STM@IFIPTM, том 244 из Electronic Notes in Theoretical Computer Science, стр. 1-2. Elsevier, (2008)An Architecture for Non Functional Properties Management in Distributed Computing., , , и . DCSOFT, стр. 26-37. INSTICC Press, (2008)The coras approach for model-based risk management applied to e-commerce domain., , , и . Communications and Multimedia Security, том 228 из IFIP Conference Proceedings, стр. 169-181. Kluwer, (2002)Compositional Structuring in the B-Method: A Logical Viewpoint of the Static Context., , , и . ZB, том 1878 из Lecture Notes in Computer Science, стр. 107-126. Springer, (2000)Security of Service Networks., , , и . Handbook of Information and Communication Security, Springer, (2010)Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures., , , , , , , , и . CEC Workshops, стр. 3-11. IEEE Computer Society, (2005)Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions., , и . ICWS, стр. 615-622. IEEE Computer Society, (2007)Notes on Refinement, Interpolation and Uniformity., и . ASE, стр. 108-116. IEEE Computer Society, (1997)On a generalized modularization theorem., и . Inf. Process. Lett., 74 (1-2): 65-71 (2000)Interpolation in Practical Formal Development., , , и . Log. J. IGPL, 9 (2): 231-244 (2001)