Author of the publication

A security policy framework for context-aware and user preferences in e-services.

, , and . J. Syst. Archit., 55 (4): 275-288 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security policy framework for context-aware and user preferences in e-services., , and . J. Syst. Archit., 55 (4): 275-288 (2009)Multibiometrics Enhancement Using Quality Measurement in Score Level Fusion., , , , and . ISDA, volume 557 of Advances in Intelligent Systems and Computing, page 260-267. Springer, (2016)Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets., , , and . IEEE Access, (2020)Computing Resource Allocation Scheme for DAG-Based IOTA Nodes., , , and . Sensors, 21 (14): 4703 (2021)Verification of smart contracts: A survey., , , and . Pervasive Mob. Comput., (2020)ABISchain: Towards a Secure and Scalable Blockchain Using Swarm-based Pruning., , , and . ACSW, page 28-35. ACM, (2023)Trustless Blockchain-based Access Control in Dynamic Collaboration., , , and . BDCSIntell, volume 2343 of CEUR Workshop Proceedings, page 27-33. CEUR-WS.org, (2018)Behavioral Verification of Service Component Architecture., , , , , and . WETICE, page 239-241. IEEE Computer Society, (2017)Towards an effective e-government framework: Tasks and instruments for design and evaluation of public sector websites., , , and . ISDA, page 193-198. IEEE, (2014)Towards a formal approach for the verification of SCA/BPEL software architectures., , , and . IISA, page 1-6. IEEE, (2017)