Author of the publication

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.

, , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 178-189. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of security-relevant semantics of BPEL in cross-domain defined business processes., , , and . Inf. Manag. Comput. Secur., 15 (2): 116-127 (2007)Mitigating the mobile agent malicious host problem by using communication patterns., , , and . Inf. Manag. Comput. Security, 13 (3): 203-211 (2005)Security Policy Enforcement in BPEL-Defined Collaborative Business Processes., , , and . ICDE Workshops, page 685-694. IEEE Computer Society, (2007)Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 178-189. Springer, (2007)Industrielle Vertriebskostenrechnung. Betriebswirtschaftliche Abhandlungen Poeschel, Stuttgart, (1963)Privacy-preserving user identity in Identity-as-a-Service., , and . ICIN, page 1-8. IEEE, (2018)Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment., , , and . Future Internet, 11 (5): 116 (2019)Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service., , , and . CommNet, page 1-8. IEEE, (2019)Efficient Privacy-preserving User Identity with Purpose-based Encryption., , , and . ISNCC, page 1-8. IEEE, (2019)Identity-as-a-Service (IDaaS): A Missing Gap for Moving Enterprise Applications in Inter-Cloud., , and . INC, page 121-126. Plymouth University, (2016)