Author of the publication

An autonomic approach for managing security and identity management policies in enterprises.

, , , and . J. High Speed Networks, 15 (3): 291-300 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rating and Ranking Versus Compliance Analysis: Defuzzification Techniques for Conceptual Design Evaluation., and . J. Multiple Valued Log. Soft Comput., 9 (3): 273-290 (2003)n-Dimensional effectiveness metric-compensating reward scheme in performance-based logistics contracts., , and . Syst. Eng., 11 (2): 93-106 (2008)Evaluation of full and degraded mission reliability and mission dependability for intermittently operated, multi-functional systems., , , and . Reliab. Eng. Syst. Saf., 92 (9): 1274-1280 (2007)A Three-Pronged Verification Approach to Higher-Level Verification Using Graph Data Structures., , , and . Syst., 12 (1): 27 (2024)A policy framework for integrated and differentiated services in the Internet., , , , and . IEEE Netw., 13 (5): 36-41 (1999)Development of the ibm.com interactive solution marketplace (ISM): A systems engineering case study., , , , and . Systems Engineering, 8 (1): 78-92 (2005)System of System case study - why the network centric command and control system needed to change: Lessons from army command and control in Operation Iraqi Freedom., and . SoSE, page 335-340. IEEE, (2011)Survey on set-based design (SBD) quantitative methods., , , and . Syst. Eng., 24 (5): 269-292 (2021)Software Architecture for Operation and Use of Quantum Communications Networks., , , and . CoRR, (2023)The SERC 5-Year Technical Plan: Designing the Future of Systems Engineering Research., , , and . CSDM, page 241. Springer, (2018)