Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web services and multimedia in m-business applications: Opportunities and concerns., , , and . Int. J. Web Inf. Syst., 2 (1): 51-62 (2006)Deploying Privacy Improved RBAC in Web Information Systems.. Int. J. Inf. Technol. Syst. Approach, 4 (2): 70-87 (2011)Security policy verification for multi-domains in cloud systems., , and . Int. J. Inf. Sec., 13 (2): 97-111 (2014)A Fine-Grained Metric System for the Completeness of Metadata., , , and . MTSR, volume 46 of Communications in Computer and Information Science, page 83-94. Springer, (2009)Supporting dynamic administration of RBAC in web-based collaborative applications during run-time., , , , and . Int. J. Inf. Comput. Secur., 2 (4): 328-352 (2008)Ασφάλεια πληροφοριακών συστημάτων και συστημάτων βάσεων δεδομένων σε περιβάλλον mobile computing. Aristotle University Of Thessaloniki, Greece, (2000)National Archive of PhD Theses: oai:10442/25608.Access Control Issues in Utilizing Fog Computing for Transport Infrastructure., , and . CRITIS, volume 9578 of Lecture Notes in Computer Science, page 15-26. Springer, (2015)A Study on User Behavior and Acceptance of Electronic Banking Services., and . Panhellenic Conference on Informatics, page 180-183. IEEE Computer Society, (2010)Utilizing Survival Analysis for Modeling Child Hazards of Social Networking., and . HAISA, page 195-204. University of Plymouth, (2012)Identifying Inference Rules for Automatic Metadata Generation from Pre-existing Metadata of Related Resources., , , and . MTSR, page 155-165. Springer, (2007)