Author of the publication

An innovative simulation environment for cross-domain policy enforcement.

, and . Simul. Model. Pract. Theory, 19 (7): 1558-1583 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Chaos Based Robust Spatial Domain Watermarking Algorithm., , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 113-119. Springer, (2007)Evaluation of e-commerce system trustworthiness using multi-criteria analysis., and . MCDM, page 86-93. IEEE, (2014)An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems., and . COMPSAC (2), page 329-334. IEEE Computer Society, (2009)978-0-7695-3726-9.Knowledge augmented policy conflict analysis for services collaboration., and . Knowl. Based Syst., (2014)Fast single image dehazing based on image fusion., , , and . J. Electronic Imaging, 24 (1): 013020 (2015)Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems., , , , and . IEEE Trans. Serv. Comput., 8 (5): 755-767 (2015)A Fuzzy Decision System Using Shoppers' Preferences for Recommendations in E-Commerce Applications., and . ISDA, page 803-808. IEEE Computer Society, (2009)Hybrid Trust Information Exchange for Federated Systems., and . DASC, page 125-133. IEEE Computer Society, (2007)Prediction of System Critical Event in Virtualized Medical Applications., and . AINA Workshops, page 13-18. IEEE Computer Society, (2014)Non-intrusive Critical System Event Recognition and Prediction in Cloud., and . IEEE CLOUD, page 659-666. IEEE Computer Society, (2014)