Author of the publication

Web Services Management Network: An Overlay Network for Federated Service Management.

, , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 351-364. Kluwer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managed Utility Computing: The Grid as Management Backplane., , and . LADC, volume 2847 of Lecture Notes in Computer Science, page 4-7. Springer, (2003)A Decision Making Model of Influencing Behavior in Information Security., , , and . EPEW, volume 8721 of Lecture Notes in Computer Science, page 194-208. Springer, (2014)Quantitative Workflow Resiliency., , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 344-361. Springer, (2014)A Community Knowledge Base for IT Security., , and . IT Prof., 13 (3): 24-30 (2011)Performability evaluation concepts and techniques.. University Twente, (1993)Managed Utility Computing.. WISE, page 277. IEEE Computer Society, (2003)International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)., , and . DSN, page 542-543. IEEE Computer Society, (2008)Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 321-336. Springer, (2013)Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies., , , and . CASoN, page 25-30. IEEE, (2011)SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment., , , and . HCI (8), volume 8517 of Lecture Notes in Computer Science, page 229-239. Springer, (2014)