Author of the publication

An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health.

, , , , and . ICDCS Workshops, page 22. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflict Analysis for Management Policies., and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 430-443. Chapman & Hall, (1997)The Uses of Role Hierarchies in Access Control., and . ACM Workshop on Role-Based Access Control, page 153-160. ACM, (1999)Risk Based Authorisation for Mobile Ad Hoc Networks., and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 188-191. Springer, (2007)Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices., and . IEEE Trans. Dependable Secur. Comput., 18 (2): 875-888 (2021)HA-Grid: Security Aware Hazard Analysis for Smart Grids., , , , , , and . SmartGridComm, page 446-452. IEEE, (2022)The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment., , , , , , , , , and 2 other author(s). POLICY, page 247-249. IEEE Computer Society, (2008)Security policy refinement using data integration: a position paper., , , , and . SafeConfig, page 25-28. ACM, (2009)PEACE: A Policy-Based Establishment of Ad-hoc Communities., , and . ACSAC, page 386-395. IEEE Computer Society, (2004)Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?, and . EDOC, page 273-284. IEEE Computer Society, (2002)Use of Roles and Policies for Specifying and Managing a Virtual Enterprise., , and . RIDE, page 72-79. IEEE Computer Society, (1999)