Author of the publication

Recovering from Malicious Attacks in Workflow Systems.

, , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 14-23. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A lattice-based approach for updating access control policies in real-time., and . Inf. Syst., 32 (5): 755-772 (2007)On the Completion of Workflows., , , and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 582-591. Springer, (2006)Concurrent and Real-Time Update of Access Control Policies., and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 330-339. Springer, (2003)Analysis of dependencies in advanced transaction models., and . Distributed Parallel Databases, 20 (1): 5-27 (2006)Solving a class of multi-scale elliptic PDEs by Fourier-based mixed physics informed neural networks., , , , and . J. Comput. Phys., (2024)When does a workflow complete?, , and . Comput. Stand. Interfaces, 33 (3): 292-300 (2011)Optimal PMU placement for power system state estimation with random communication packet losses., , , and . ICCA, page 444-448. IEEE, (2011)Implementing Real-Time Update of Access Control Policies., and . DBSec, volume 144 of IFIP, page 65-80. Kluwer/Springer, (2004)A new distributed state estimation technique for power networks., , , and . ACC, page 3338-3343. IEEE, (2013)Reliable Scheduling of Advanced Transactions., , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 124-138. Springer, (2005)