Author of the publication

A Layered IT Infrastructure for Secure Interoperability in Personal Data Registry Digital Government Services.

, , , and . RIDE, page 95-102. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of complex security scenarios using defense trees and economic indexes., , , and . J. Exp. Theor. Artif. Intell., 24 (2): 161-192 (2012)Contextual Specialization of Constraint Logic Programs., and . APPIA-GULP-PRODE, page 455-470. (1999)Satisfiability of Constrained Horn Clauses on Algebraic Data Types: A Transformation-based Approach., , , and . CoRR, (2021)Solving Horn Clauses on Inductive Data Types Without Induction - ERRATUM., , , and . Theory Pract. Log. Program., 19 (4): 629 (2019)Verifying Catamorphism-Based Contracts using Constrained Horn Clauses., , , and . Theory Pract. Log. Program., 22 (4): 555-572 (2022)Verification of Programs by Combining Iterated Specialization with Interpolation., , , and . HCVS, volume 169 of EPTCS, page 3-18. (2014)A Specification for Security Services on Computational Grids., , , and . GSEM, volume 3270 of Lecture Notes in Computer Science, page 119-135. Springer, (2004)Evaluating the Aspect-Category-Opinion-Sentiment Analysis Task on a Custom Dataset (short paper)., and . NL4AI@AI*IA, volume 3551 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Semantics and Controllability of Time-Aware Business Processes., , , , and . Fundam. Informaticae, 165 (3-4): 205-244 (2019)Towards benchmarking of Solidity verification tools., , , , and . CoRR, (2024)