Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Terminology for Control Models at Optical Exchanges., , , , , , , and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 49-60. Springer, (2007)Job-centric security model for open collaborative environment., , , , , and . CTS, page 69-77. IEEE Computer Society, (2005)Authorization of a QoS path based on generic AAA., , , and . Future Gener. Comput. Syst., 19 (6): 1009-1016 (2003)Token based networking: Experiment NL-101., , , , , , and . Future Gener. Comput. Syst., 22 (8): 1025-1031 (2006)Seamless live migration of virtual machines over the MAN/WAN., , , , , , , , , and . Future Gener. Comput. Syst., 22 (8): 901-907 (2006)On advance reservation of heterogeneous network paths., , , , , , and . Future Gener. Comput. Syst., 21 (4): 525-538 (2005)Dynamic paths in multi-domain optical networks for grids., , , , , and . Future Gener. Comput. Syst., 21 (4): 539-548 (2005)Security Architecture for Open Collaborative Environment., , , , , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 589-599. Springer, (2005)Web services and grid security vulnerabilities and threats analysis and model., , , and . GRID, page 262-267. IEEE Computer Society, (2005)