Author of the publication

An evolving trust paradigm for enforcing computing system security.

, , , and . CEC, page 2595-2602. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Relevant Services in Pervasive Environments Using Semantics and Context., , and . IWUC, page 3-12. INSTICC Press, (2006)An evolving trust paradigm for enforcing computing system security., , , and . CEC, page 2595-2602. IEEE, (2015)JINI/J2EE Bridge for Large-scale IP Phone Services., , and . APSEC, page 302-309. IEEE Computer Society, (2003)Using the Web and Jini to link Vending Machines and Enterprise Systems., , and . TOOLS (36), page 260-264. IEEE Computer Society, (2000)Speech Interface: An Enhancer to the Acceptance of M-Commerce Applications., , , and . ICMB, page 445-451. IEEE Computer Society, (2005)Service Discovery for Distributed Multimedia Systems.. iiWAS, volume 183 of books@ocg.at, Austrian Computer Society, (2004)Using Ajax to Track Student Attention.. Int. J. Web Portals, 2 (4): 18-27 (2010)Lessons from Open Source: Intellectual Property and Courseware.. First Monday, (2001)W3 Trust-Profiling Framework (W3TF) to Assess Trust and Transitivity of Trust of Web-Based Services in a Heterogeneous Web Environment., , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 367-378. Springer, (2006)Grouping Verifiable Content for Selective Disclosure., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 1-12. Springer, (2003)