From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Assessment Model for Software Maintenance Tools: A Conceptual Framework., , и . PACIS, стр. 51. AISeL, (1997)SecCom: A Prototype for Integrating Security-Aware Components., и . UNISCON, том 20 из Lecture Notes in Business Information Processing, стр. 393-403. Springer, (2009)Addressing security compatibility for multi-tenant cloud services., , , и . Int. J. Comput. Appl. Technol., 47 (4): 370-378 (2013)TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security., , , , и . CoRR, (2022)Tasks and Methods for Software Maintenance: a process oriented framework., , и . Australas. J. Inf. Syst., (2001)Role updating in information systems using model checking., , , , и . Knowl. Inf. Syst., 51 (1): 187-234 (2017)A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components., , и . Australian Software Engineering Conference, стр. 117-126. IEEE Computer Society, (2001)Automatic verification of health regulatory compliance in cloud computing., и . Healthcom, стр. 719-721. IEEE, (2013)Data confidentiality in cloud-based pervasive system., , и . ICC, стр. 185:1-185:6. ACM, (2017)Specifying Security Goals of Component Based Systems: An End-User Perspective., и . ICCBSS, стр. 101-109. IEEE Computer Society, (2008)