Author of the publication

On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management.

, , , , , and . ISAS, volume 3694 of Lecture Notes in Computer Science, page 149-163. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , and . ACM Conference on Computer and Communications Security, page 154-164. ACM, (1993)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 188-202. Springer, (2010)Cognitive task analysis of network analysts and managers for network situational awareness., , , , and . VDA, volume 7530 of SPIE Proceedings, page 75300. SPIE, (2010)Joining the Security Education Community., and . IEEE Secur. Priv., 2 (5): 61-63 (2004)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , and . SECRYPT, page 546-553. INSTICC Press, (2008)Who Owns Your Computer?, and . IEEE Secur. Priv., 4 (2): 61-63 (2006)Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory., and . ACM Southeast Regional Conference (2), page 142-147. ACM, (2005)1-59593-059-0.Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , and . ICDCS Workshops, page 144-151. IEEE Computer Society, (2005)Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks., , , , , and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 138-147. Springer, (2009)