Author of the publication

Visual modelling of role-based security policies in distributed multimedia applications.

, , , and . ISMSE, page 138-141. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Migrating Legacy Video Lectures to Multimedia Learning Objects., , , , and . ICEIS (4), page 51-58. (2006)Dialogue-driven Search in Surveillance Videos ., , , and . DMS, page 134-139. Knowledge Systems Institute, (2011)Role Based Reengineering of Web Applications., , , , and . WSE, page 103-110. IEEE Computer Society, (2005)A Visual Language for Data Integration., , , , and . DMS, page 300-305. Knowledge Systems Institute, (2008)Exploiting Visual Language Technologies in Structural Analysis., , , and . DMS, page 285-288. Knowledge Systems Institute, (2011)Exploiting Interaction Features in User Intent Understanding., , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 506-517. Springer, (2013)Migrating Legacy Video Lectures to Multimedia Learning Objects, , , , and . ICEIS 2006 - Proceedings of the Eighth International Conference on Enterprise Information Systems: Databases and Information Systems Integration, Paphos, Cyprus, May 23-27, 2006, page 51--58. INSTICC, (23-27 maggio 2006)Logging and Visualization of Learner Behaviour in Web-Based E-Testing., , , and . ICWL, volume 4823 of Lecture Notes in Computer Science, page 452-463. Springer, (2007)Visual Computer-Managed Security: A Framework for Developing Access Control in Enterprise Applications., and . IEEE Softw., 30 (5): 62-69 (2013)Early Performance Analysis in the Design of Spatial Databases., , , , and . ICSOFT (ISDM/EHST/DC), page 172-177. INSTICC Press, (2007)