Author of the publication

Transparent security for collaborative environments.

, , , , and . CollaborateCom, page 79-84. IEEE Computer Society / ICST, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common ELIXIR Service for Researcher Authentication and Authorisation., , , , , , , , , and 2 other author(s). F1000Research, (2018)A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture., , and . AINA Workshops (1), page 614-619. IEEE Computer Society, (2007)Sealed Grid with Downloadable Services., , and . CoreGRID, page 83-91. Springer, (2007)de.NBI Cloud federation through ELIXIR AAI., , , , , , , , , and 3 other author(s). F1000Research, (2019)User centric authentication for web applications., , and . CTS, page 67-74. IEEE, (2010)jSon: Network of Active Elements with Peer-to-Peer Control Plane., , and . ICN, page 208-213. IEEE Computer Society, (2009)Active Element Network with P2P Control Plane., , and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 257. Springer, (2006)Optimization Of Neural Network Inputs By Feature Selection Methods., , , and . ECMS, page 440-445. European Council for Modeling and Simulation, (2011)Secure and Pervasive Collaborative Platform for Medical Applications., , , and . HealthGrid, volume 126 of Studies in Health Technology and Informatics, page 229-238. IOS Press, (2007)Optimization of Artificial Neural Network Structure in the Case of Steganalysis., , , , and . Handbook of Optimization, volume 38 of Intelligent Systems Reference Library, Springer, (2013)