From post

A Federated Digital Identity Management Approach for Business Processes.

, , , , и . CollaborateCom, том 10 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 194-206. Springer / ICST, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and privacy-preserving enforcement of attribute-based access control., , и . IDtrust, стр. 63-68. ACM, (2010)PriMa: an effective privacy protection mechanism for social networks., , и . AsiaCCS, стр. 320-323. ACM, (2010)Fuzzy-based approach to assess and prioritize privacy risks., , и . Soft Comput., 24 (3): 1553-1563 (2020)VeryIDX - A Digital Identity Management System for Pervasive Computing Environments., , , , , и . SEUS, том 5287 из Lecture Notes in Computer Science, стр. 268-279. Springer, (2008)Connecting Regulatory Requirements to Audit Outcomes: A Model-driven Approach to Auditable Compliance., , , и . MoDELS (Companion), стр. 641-642. IEEE, (2021)A Load Time Policy Checker for Open Multi-application Smart Cards., , , , и . POLICY, стр. 153-156. IEEE Computer Society, (2011)Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications., , , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 187-192. Springer, (2010)Verification of Access Control Requirements in Web Services Choreography., , и . IEEE SCC (1), стр. 5-12. IEEE Computer Society, (2008)Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations., , , , и . ICDCS, стр. 2632-2633. IEEE Computer Society, (2017)A Distributed Access Control System for Cloud Federations., , и . ICDCS, стр. 2131-2136. IEEE Computer Society, (2017)