Author of the publication

Towards a Built-In Digital Forensics-Aware Framework for Web Services.

, , , , , and . CIS, page 367-370. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Time-Related Analysis in Business Protocols., , , , and . ICWS, page 141-148. IEEE Computer Society, (2009)A Web service based integration model of data-providing sources., and . ICDIM, page 320-325. IEEE, (2013)Reasoning about Events to Specify Authorization Policies forWeb Services Composition., and . ICWS, page 481-488. IEEE Computer Society, (2007)Requirements-driven Verification of WSBPEL Processes., and . ICWS, page 354-363. IEEE Computer Society, (2007)Analysis of Composite Web Services Using Logging Facilities., and . ICSOC Workshops, volume 4652 of Lecture Notes in Computer Science, page 74-85. Springer, (2006)RESTful Web Services for High Speed Intrusion Detection Systems., and . ICWS, page 621-622. IEEE Computer Society, (2013)A service oriented communication model for high speed intrusion detection systems., and . Int. J. Bus. Inf. Syst., 17 (3): 323-339 (2014)A run-time service discovery process for web services compositions., and . ICEC, volume 342 of ACM International Conference Proceeding Series, page 2:1-2:10. ACM, (2008)A Run-Time Service Discovery Tool for Web Services Compositions., and . ICEBE, page 179-187. IEEE Computer Society, (2008)A Contract-Based Approach for Monitoring Collaborative Web Services Using Commitments in the Event Calculus., , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 426-434. Springer, (2005)