Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tailored Security: Building Nonrepudiable Security Service-Level Agreements., , , , , , and . IEEE Veh. Technol. Mag., 8 (3): 54-62 (2013)Applicability of Host Identities in Securing Network Attachment and Ensuring Service Accountability.. University of Tampere, Finland, (2011)base-search.net (ftunivtampere:oai:trepo.tuni.fi:10024/114308).Continuous On-Line Validation of Web Services., , , and . ELPUB, Verlag für Wissenschaft und Forschung, (2002)Accountable security mechanism based on security service level agreement., , , , , , and . ISCC, page 404-410. IEEE Computer Society, (2013)Identity-bound accounting., and . CNSM, page 382-385. IEEE, (2010)A non-repudiable negotiation protocol for security service level agreements., , , , , , and . Int. J. Commun. Syst., 28 (15): 2067-2081 (2015)Security and User Guidelines for the Design of the Future Networked Systems., , and . ICDS, page 13-19. IEEE Computer Society, (2009)Security and Accounting Enhancements for Roaming in IMS.. WWIC, volume 5031 of Lecture Notes in Computer Science, page 127-138. Springer, (2008)Privacy-enhanced personalisation in ambient environments., , , , and . PIMRC, page 1-6. IEEE, (2008)Service Usage Accounting., and . IEEE Veh. Technol. Mag., 6 (1): 60-67 (2011)