Author of the publication

On the Enhancement of BPEL Engines for Self-Healing Composite Web Services.

, , , , and . SAINT, page 33-39. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Pervasive Environments, What's Next?. Security and Management, page 93-98. CSREA Press, (2003)On Modeling and Developing Self-Healing Web Services Using Aspects., , , and . COMSWARE, IEEE, (2007)Context-Based Constraints in Security: Motivations and First Approach., and . CWS@CONTEXT, volume 146 of Electronic Notes in Theoretical Computer Science, page 85-100. Elsevier, (2005)An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics., , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 983-993. Springer, (2004)Decoupling Security Concerns in Web Services Using Aspects., , , and . ITNG, page 20-27. IEEE Computer Society, (2006)A Context-Based Security Framework for Cloud Services., , and . ICCASA, page 130-137. ACM, (2014)Context-Driven Policy Enforcement and Reconciliation for Web Services., , , and . ICEIS (4), page 93-99. (2006)SC-WS: A Context-based, Aspect-oriented Approach for Handling Security Concerns in Web Services., , and . IJOCI, 4 (2): 31-44 (2014)Developing Interoperable Business Processes Using Web Services and Policies., , , , and . I-ESA, page 475-487. Springer, (2006)Human-centric network security management: a comprehensive helper., and . WMASH, page 47-52. ACM, (2006)