Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interaction spaces in computer-mediated communication., , , , and . AI Soc., 19 (1): 22-33 (2005)Understanding a Sense of Place in Collaborative Environments.. HCI (9), volume 4558 of Lecture Notes in Computer Science, page 863-872. Springer, (2007)Interaction space theory: a framework for tool development., , , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 427-432. Trinity College Dublin, (2003)Technology and knowledge: the affirmation of power.. AI Soc., 18 (4): 310-333 (2004)Consumer-Managed Federated Homes., , , , , and . IEEE Commun. Mag., 52 (6): 194-201 (2014)The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.. ACM Conference on Computer and Communications Security, page 125-134. ACM, (1997)Authorisation Subterfuge by Delegation in Decentralised Networks., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 97-102. Springer, (2005)Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.. IFIPTM, volume 401 of IFIP Advances in Information and Communication Technology, page 193-207. Springer, (2013)Conduit cascades and secure synchronization.. NSPW, page 141-150. ACM, (2000)A collaborative approach to autonomic security protocols., and . NSPW, page 13-21. ACM, (2004)