Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models and Methods for the Analysis of the Diffusion of Skills in Social Networks., , and . OR, page 475-481. Springer, (2015)Coordination and Security on the Internet., and . Coordination of Internet Agents: Models, Technologies, and Applications, Springer, (2001)Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research., , and . ARES, page 67:1-67:10. ACM, (2019)Access Control in Location-Based Services., , , and . Privacy in Location-Based Applications, volume 5599 of Lecture Notes in Computer Science, page 106-126. Springer, (2009)Supporting location-based conditions in access control policies., , , , and . AsiaCCS, page 212-222. ACM, (2006)Building Mobile Agent Applications in HiMAT., , and . PDSE, page 174-181. IEEE Computer Society, (1999)The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities., , , and . CoRR, (2018)The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks., and . J. Artif. Soc. Soc. Simul., (2020)Mobile Agents Integrity for Electronic Commerce Applications., , , and . Inf. Syst., 24 (6): 519-533 (1999)The Architecture of a Privacy-Aware Access Control Decision Component., , , , and . CASSIS, volume 3956 of Lecture Notes in Computer Science, page 1-15. Springer, (2005)