Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative evaluation of state-of-the-art web service composition testing approaches., , , and . AST, page 29-35. ACM, (2011)A comparative evaluation of semantic web service discovery approaches., , , , and . iiWAS, page 33-39. ACM, (2010)An effective access control approach to support web service security., , , and . iiWAS, page 529-535. ACM, (2009)An evaluation of process mediation approaches in web services., , , , and . iiWAS, page 48-55. ACM, (2010)Security conscious composition of Semantic Web services based on AI planning and description logic., , , , and . iiWAS, page 536-542. ACM, (2009)Security conscious AI-planning-based composition of semantic web services., , , , and . IJWIS, 6 (3): 203-229 (2010)SCAIMO - A Case for Enabling Security in Semantic Web Service Composition., , , , and . FGIT-GDC, volume 63 of Communications in Computer and Information Science, page 65-72. Springer, (2009)Security conscious AI-planning-based composition of semantic web services., , , , and . IJWIS, 6 (3): 203-229 (2010)Security-aware web service composition approaches: state-of-the-art., , , , and . iiWAS, page 112-121. ACM, (2011)An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery., , and . CCGRID, page 104-112. IEEE Computer Society, (2010)