Author of the publication

The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.

, , and . IEEE Trans. Syst. Man Cybern. Part C, 38 (3): 319-333 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded Proofs for Verifiable Neural Networks., , and . IACR Cryptology ePrint Archive, (2017)Privacy and confidentiality in context-based and epidemic forwarding., , and . Comput. Commun., 33 (13): 1493-1504 (2010)Automating the Composition of Transactional Web Services., , and . Int. J. Web Serv. Res., 5 (1): 24-41 (2008)Policy-based encryption schemes from bilinear pairings., , and . AsiaCCS, page 368. ACM, (2006)A Development and Runtime Platform for Teleconferencing Applications., , , and . IEEE J. Sel. Areas Commun., 15 (3): 576-588 (1997)Policy-Based Cryptography and Applications., and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 72-87. Springer, (2005)Information Confinement, Privacy, and Security in RFID Systems., and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 187-202. Springer, (2007)Enabling adaptive and secure extranets., , , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 123-135. Kluwer, (2002)Identity Based Message Authentication for Dynamic Networks., and . SEC, volume 201 of IFIP, page 50-61. Springer, (2006)A Leakage-Abuse Attack Against Multi-User Searchable Encryption., , and . Proc. Priv. Enhancing Technol., 2017 (3): 168 (2017)