Author of the publication

Use of XACML Policies for a Network Access Control Service.

, , and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 111-122. IOS Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IMM-EKF based Road Vehicle Navigation with Low Cost GPS/INS., , and . MFI, page 433-438. IEEE, (2006)Fuzzy modeling with hybrid systems., and . Fuzzy Sets Syst., 104 (2): 199-208 (1999)A frequency model in a fuzzy environment., and . Int. J. Approx. Reason., 11 (2): 159-174 (1994)Using identities to achieve enhanced privacy in future content delivery networks., and . Comput. Electr. Eng., 38 (2): 346-355 (2012)Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool., , , , and . IEEE Trans. Learn. Technol., 6 (1): 85-96 (2013)PKI Services for IPv6., , , and . IEEE Internet Comput., 7 (3): 36-42 (2003)Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier., , and . J. Univers. Comput. Sci., 19 (16): 2368-2384 (2013)A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing., , , and . J. Univers. Comput. Sci., 15 (3): 555-583 (2009)Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things., , and . Mob. Inf. Syst., 8 (3): 177-197 (2012)Evaluation of the electromagnetic absorption in furniture for the integration of UHF-RFID tags., , , , and . RFID-TA, page 81-88. IEEE, (2011)