Author of the publication

A Transformation Approach for Security Enhanced Business Processes

, , and . Proc. SE2008 of 26th IASTED International Multi-Conference, (February 2008)to appear.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authors vs. readers: a comparative study of document metadata and content in the www., and . ACM Symposium on Document Engineering, page 177-186. ACM, (2007)Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses., , and . CoRR, (2019)Collaboration and Teamwork on a MOOC Platform: A Toolset., and . L@S, page 165-168. ACM, (2017)Signed URL for an Isolated Web Server in a Virtual Laboratory., , and . ICETC, page 218-222. ACM, (2017)Sample Method for Minimization of OBDDs., and . SOFSEM, volume 1521 of Lecture Notes in Computer Science, page 419-428. Springer, (1998)A Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams., and . STACS, volume 1200 of Lecture Notes in Computer Science, page 213-224. Springer, (1997)Secure Communication Using Identity Based Encryption., , , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 256-267. Springer, (2010)Lower Bounds for the Modular Communication Complexity of Various Graph Accessibility Problems., and . LATIN, volume 911 of Lecture Notes in Computer Science, page 427-435. Springer, (1995)Deployment of Virtual Machines in Lock-Keeper., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 147-159. Springer, (2006)Offline-enabled web-based E-leaming for improved user experience in Africa., , and . AFRICON, page 736-742. IEEE, (2017)