Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Composition of Web Services Using Wrappers., and . ISoLA, volume 17 of Communications in Computer and Information Science, page 862-865. Springer, (2008)Formal Modelling of a Usable Identity Management Solution for Virtual Organisations, , , , , , and . FAVO, volume 16 of EPTCS, page 41-50. (2009)A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service., , , , , , , , , and 19 other author(s). J. Internet Serv. Appl., 4 (1): 1:1-1:17 (2013)Abstractions of Web Services., and . ICECCS, page 182-191. IEEE Computer Society, (2009)Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion., and . ISoLA, volume 17 of Communications in Computer and Information Science, page 831-846. Springer, (2008)Flexible composition and execution of large scale applications on distributed e-infrastructures., , , and . J. Comput. Sci., 5 (1): 51-62 (2014)Security and Privacy in Sharing Patient Data, , and . Peter Coveney, Vanessa Díaz-Zuccarini, Peter Hunter, Marco Viceconti (editors), Computational biomedicine : modelling the human body, Oxford University Press, (2014)Formal Modelling of PKI Based Authentication., and . WWV, volume 235 of Electronic Notes in Theoretical Computer Science, page 55-70. Elsevier, (2008)Audited credential delegation - a user-centric identity management solution for computational grid environments., , , , and . IAS, page 222-227. IEEE, (2010)Audited credential delegation: a usable identity management solution for grid environments., , and . TG, page 31:1-31:2. ACM, (2011)