The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Giovanni Russello: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giovanni Russello, Changyu Dong, Naranker Dulay
    Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:489-496 [Conf]
  2. Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
    Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE (2), 2004, pp:1225-1242 [Conf]
  3. Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
    Dynamically Adapting Tuple Replication for Managing Availability in a Shared Data Space. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2005, pp:109-124 [Conf]
  4. Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
    Exploiting Differentiated Tuple Distribution in Shared Data Spaces. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2004, pp:579-586 [Conf]
  5. Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
    Customizable Data Distribution for Shared Data Spaces. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:122-131 [Conf]
  6. Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen, Ibrahim Bokharouss
    An experimental evaluation of self-managing availability in shared data spaces. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:2, pp:246-262 [Journal]
  7. Giovanni Russello, Changyu Dong, Naranker Dulay
    Authorisation and Conflict Resolution for Hierarchical Domains. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:201-210 [Conf]

  8. A Workflow-Based Access Control Framework for e-Health Applications. [Citation Graph (, )][DBLP]


  9. An Architectural Approach for Self-Managing Security Services. [Citation Graph (, )][DBLP]


  10. ESCAPE: A Component-Based Policy Framework for Sense and React Applications. [Citation Graph (, )][DBLP]


  11. An opportunistic authority evaluation scheme for data security in crisis management scenarios. [Citation Graph (, )][DBLP]


  12. Encrypted Shared Data Spaces. [Citation Graph (, )][DBLP]


  13. Shared and Searchable Encrypted Data for Untrusted Servers. [Citation Graph (, )][DBLP]


  14. Flexible Resolution of Authorisation Conflicts in Distributed Systems. [Citation Graph (, )][DBLP]


  15. Consent-Based Workflows for Healthcare Management. [Citation Graph (, )][DBLP]


  16. xDUCON: Cross Domain Usage Control through Shared Data Spaces. [Citation Graph (, )][DBLP]


  17. Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. [Citation Graph (, )][DBLP]


  18. Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. [Citation Graph (, )][DBLP]


  19. GSpace: an architectural approach for self-managing extra-functional concerns. [Citation Graph (, )][DBLP]


  20. xDUCON: Coordinating Usage Control Policies in Distributed Domains. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002