Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compile-Time Detection of Information Flow in Sequential Programs., , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 55-73. Springer, (1994)Message Quality for Ambient System Security.. ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 439-450. Springer, (2008)7th Workshop on Mobile Object Systems., and . ECOOP Workshops, volume 2323 of Lecture Notes in Computer Science, page 165-168. Springer, (2001)Resource management for clusters of virtual machines., , , , , , and . CCGRID, page 382-389. IEEE Computer Society, (2005)Security Engineering of Lattice-Based Policies.. CSFW, page 195-208. IEEE Computer Society, (1997)A resource management interface for the Java platform., , , , and . Softw. Pract. Exp., 35 (2): 123-157 (2005)An Access Control Model or a Parallel Object-Based Programming Language.. Security for Object-Oriented Systems, page 166-182. Springer, (1993)The Lana Aproach to Wireless Computing., , and . HotOS, page 180. IEEE Computer Society, (2001)Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08)., , and . ASE Workshops, IEEE, (2008)Mobile Object Systems: Resource-Aware Computation., and . ECOOP Workshops, volume 3013 of Lecture Notes in Computer Science, page 86-91. Springer, (2003)