Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Ontology-based Security Policy Management in the Grid., and . ECIW, page 107-116. Academic Conferences Limited, Reading, UK, (2005)A Battery Powered Vision Sensor for Forensic Evidence Gathering., , , , , , and . ICDSC, page 15:1-15:6. ACM, (2019)Employing Ontologies for the Development of Security Critical Applications., , , , , , and . I3E, volume 189 of IFIP, page 187-201. Springer, (2005)A generic Grid security policy reconciliation framework., , , and . Internet Res., 15 (5): 508-517 (2005)An ontology for secure e-government applications., , , , , , and . ARES, page 1033-1037. IEEE Computer Society, (2006)Incorporating Security Requirements Into the Software Development Process., , , , , and . ECIW, page 21-28. Academic Conferences Limited, Reading, UK, (2005)Robo-cook's Path: An online multiplayer board dietary game., , , , , and . PETRA, page 330-335. ACM, (2022)A survey on AI nutrition recommender systems., , , , and . PETRA, page 540-546. ACM, (2019)Promoting the Mediterranean Diet: A Co-design Game Approach., , , , , and . HCI (44), volume 1833 of Communications in Computer and Information Science, page 25-32. Springer, (2023)A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)