Author of the publication

Confining the Insider Threat in Mass Virtual Hosting Systems.

, , and . WOSIS, page 105-114. INSTICC Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., and . ISCC, page 821-827. IEEE Computer Society, (2003)A General Methodology for Robotic Haptic Recognition of 3-D Objects., and . ICEIS, page 203-210. (1999)Efficient authentication and verification of certificate status within public-key infrastructures., and . Communications, Internet, and Information Technology, page 182-188. IASTED/ACTA Press, (2004)A flexible scheme for on-line public-key certificate status updating and verification., and . ISCC, page 891-898. IEEE Computer Society, (2002)Confining the Insider Threat in Mass Virtual Hosting Systems., , and . WOSIS, page 105-114. INSTICC Press, (2007)A hybrid system for knowledge-based synthesis of robot grasps., , , and . IROS, page 1575-1581. IEEE, (1993)Architectural design patterns for logic control of manufacturing systems: The generalized device., , , , and . ICAT, page 1-7. IEEE, (2009)MININET: A Local Area Network for Real-Time Instrumentation Applications., , , , , and . Comput. Networks, (1984)A neural approach to robotic haptic recognition of 3-D objects based on a Kohonen self-organizing feature map., , , and . IEEE Trans. Ind. Electron., 44 (2): 267-269 (1997)A Novel Approach to On-Line Status Authentication of Public-Key Certificates., and . ACSAC, page 270-277. IEEE Computer Society, (2000)