Author of the publication

Generic Security Policy Transformation Framework for WS-Security.

, and . ICWS, page 513-520. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualization of Distributed Processes Using "Data Jewelry Box" Algorithm., and . Computer Graphics International, page 162-169. IEEE Computer Society, (2003)Voxel Stuffing: High-Quality Volume Interpolation from Multiple Sequences of Cross-Sectional Images., , , and . MIAR, page 235-240. IEEE Computer Society, (2001)Generic Security Policy Transformation Framework for WS-Security., and . ICWS, page 513-520. IEEE Computer Society, (2007)Easy-To-Use Programming Model for Web Services Security., , , and . APSCC, page 275-282. IEEE Computer Society, (2007)Hierarchical Data Visualization Using a Fast Rectangle-Packing Algorithm., , , and . IEEE Trans. Vis. Comput. Graph., 10 (3): 302-313 (2004)Topologically-accentuated volume rendering., , , and . Data Visualization: The State of the Art, page 95-108. Kluwer, (2003)HapMonster: A Statistically Unified Approach for Variant Calling and Haplotyping Based on Phase-Informative Reads., , , , , , and . AlCoB, volume 8542 of Lecture Notes in Computer Science, page 107-118. Springer, (2014)HLA-VBSeq: accurate HLA typing at full resolution from whole-genome sequencing data., , , , , , , , and . BMC Genom., 16 (S-2): S7 (2015)A statistical variant calling approach from pedigree information and local haplotyping with phase informative reads., , , , , , and . Bioinform., 29 (22): 2835-2843 (2013)iSVP: an integrated structural variant calling pipeline from high-throughput sequencing data., , , , , , , and . BMC Syst. Biol., 7 (S-6): S8 (2013)