Author of the publication

Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.

, , , and . ICDE, page 119. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teaching privacy in an interactive fashion., , , , and . InfoSecCD, page 7:1-7:7. ACM, (2014)A framework for verification and optimal reconfiguration of event-driven role based access control policies., , , and . SACMAT, page 197-208. ACM, (2012)Utilizing social media to improve local government responsiveness., , , , , , , , and . DG.O, page 236-244. ACM, (2014)Blockchain Based Auditable Access Control for Distributed Business Processes., , , , , and . ICDCS, page 12-22. IEEE, (2020)ASSEMBLE: a collaborative business process development tool., , , , , , , and . ICSE (Companion Volume), page 376-377. ACM, (2018)A Framework for Policy Similarity Evaluation and Migration Based on Change Detection., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 191-205. Springer, (2015)Discovering Events from Social Media for Emergency Planning., , , , and . DG.O, page 109-116. ACM, (2019)Community based emergency response., , , , , , and . DG.O, page 82-91. ACM, (2013)Provision of Multimedia Services in a Mobile Ad Hoc Network., , , and . WORDS Fall, page 87-93. IEEE Computer Society, (2003)Dependencies and separation of duty constraints in GTRBAC., , , and . SACMAT, page 51-64. ACM, (2003)