Author of the publication

A Secure Transaction Environment for Workflows in Distributed Systems.

, , , and . ICPADS, page 198-208. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Software Security Through an Integrated Approach., , and . SECRYPT, page 437-442. INSTICC Press, (2006)A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 113-116. Kluwer, (2003)Analysis of traceback techniques., and . ACSW, volume 54 of CRPIT, page 115-124. Australian Computer Society, (2006)Towards a Generic Logic for Analysing Network Protocols., , and . ICDCS Workshop on Internet, page A19-A26. (2000)On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems., , , and . MobiQuitous, page 432-441. ACM, (2017)On the design of Virtual machine Intrusion detection system., and . Integrated Network Management, page 682-685. IEEE, (2011)Distributed service control technique for detecting security attacks., and . NOMS, page 574-577. IEEE, (2012)Feature-Distributed Malware Attack: Risk and Defence., and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 457-474. Springer, (2014)On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience., and . IEEE Trans. Cloud Computing, 5 (3): 375-389 (2017)Robust non-interactive oblivious transfer., , , and . IEEE Communications Letters, 7 (4): 153-155 (2003)