Author of the publication

A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation.

, , , , and . Int. J. Web Serv. Res., 15 (4): 61-81 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Sharing Scheme for Data Integrity Protection in WSNs., , , , , and . Wireless Personal Communications, 89 (1): 211-226 (2016)Dimensionality reduction in data mining: A Copula approach., , , , and . Expert Syst. Appl., (2016)Big Data Technologies to Improve Medical Data Warehousing., , , and . BDCA, page 21:1-21:5. ACM, (2017)A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks., , , , , and . ICC 2016, page 70:1-70:6. ACM, (2016)Coalition formation with dynamically changing externalities., , , and . Eng. Appl. Artif. Intell., (2020)Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks., , and . Int. J. Bus. Data Commun. Netw., 12 (1): 16-35 (2016)Implementation and comparison of binary thinning algorithms on GPU., , and . Computing, 101 (8): 1091-1117 (2019)A Correct-by-Construction Model for Attribute-Based Access Control., , and . MEDI, volume 11163 of Lecture Notes in Computer Science, page 233-247. Springer, (2018)Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET., , , and . J. Inf. Secur. Appl., (2018)Smart Design for Resources Allocation in IoT Application Service based on multi-agent system and CSP., , , and . Informatica (Slovenia), (2020)