The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Philip Robinson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip Robinson, Florian Kerschbaum, Andreas Schaad
    From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:297-309 [Conf]
  2. Philip Robinson, Jochen Haller
    Revisiting the Firewall Abolition Act. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:206- [Conf]
  3. Michael Beigl, Albert Krohn, Tobias Zimmer, Christian Decker, Philip Robinson
    AwareCon: Situation Aware Context Communication. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2003, pp:132-139 [Conf]
  4. Philip Robinson, Christian Schaefer, Thomas Walter
    POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:13-24 [Conf]
  5. Philip Robinson, Jochen Haller, Roger Kilian-Kehr
    Towards Trust Relationship Planning for Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:355-361 [Conf]
  6. Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson
    PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:193-205 [Conf]
  7. Christian Decker, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach
    eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2004, pp:254-268 [Conf]
  8. Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier
    Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:696-701 [Conf]
  9. Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr
    Framework and Architecture for Secure Mobile Business Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:413-416 [Conf]
  10. Philip Robinson, Michael Beigl
    Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:157-172 [Conf]
  11. Albert Krohn, Michael Beigl, Christian Decker, Uwe Kochendörfer, Philip Robinson, Tobias Zimmer
    Inexpensive and Automatic Calibration for Acceleration Sensors. [Citation Graph (0, 0)][DBLP]
    UCS, 2004, pp:245-258 [Conf]
  12. Philip Robinson, Yücel Karabulut, Jochen Haller
    Dynamic virtual organization management for service oriented enterprise applications. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  13. Philip Robinson
    Extensible Security Patterns. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:729-733 [Conf]
  14. Florian Kerschbaum, Rafael Deitos, Philip Robinson
    Securing VO Management. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:14-23 [Conf]
  15. Carsten Franke, Adolf Hohl, Philip Robinson, Bernd Scheuermann
    On Business Grid Demands and Approaches. [Citation Graph (0, 0)][DBLP]
    GECON, 2007, pp:124-135 [Conf]
  16. Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin
    Security and Trust in IT Business Outsourcing: a Manifesto. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:47-58 [Journal]

  17. A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. [Citation Graph (, )][DBLP]


  18. Virtual Organization Management in XtreemOS: an Overview. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002