| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
IEEE CAA J. Autom. Sinica
|
| 2022 | — | conf |
MICCAI (2)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Autom.
|
| 2014 | B | conf |
SMC
|
| 2014 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2011 | J | jnl |
Int. J. Softw. Informatics
|
| 2010 | — | conf |
ISoLA (2)
|
| 2009 | C | conf |
CollaborateCom
|
| 2009 | C | conf |
CollaborateCom
|
| 2009 | J | jnl |
J. Univers. Comput. Sci.
|
| 2009 | — | conf |
WOSIS
|
| 2009 | — | book |
Security engineering for service-oriented architectures.
|
| 2009 | — | conf |
OTM Conferences (2)
|
| 2008 | J | jnl |
Comput. Stand. Interfaces
|
| 2008 | C | conf |
SACMAT
|
| 2008 | J | jnl |
J. Comput. Secur.
|
| 2008 | J | jnl |
J. Enterp. Inf. Manag.
|
| 2008 | — | conf |
UNISCON
|
| 2008 | — | conf |
eHealth
|
| 2008 | — | conf |
MODSEC@MoDELS
|
| 2007 | — | conf |
WOSIS
|
| 2007 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2007 | — | conf |
A technical architecture for enforcing usage control requirements in service-oriented architectures.
SWS
|
| 2007 | J | jnl |
J. Softw.
|
| 2007 | — | conf |
MoDELS (Workshops)
|
| 2006 | B | conf |
TrustBus
|
| 2006 | C | conf |
PST
|
| 2006 | C | conf |
PST
|
| 2006 | — | conf |
IASTED Conf. on Software Engineering
|
| 2006 | B | conf |
ARES
|
| 2006 | — | conf |
I-ESA
|
| 2006 | — | conf |
WOSIS
|
| 2006 | J | jnl |
Internet Res.
|
| 2006 | A | conf |
MoDELS
|
| 2005 | — | conf |
ICEIS (3)
|
| 2005 | — | conf |
OTM Workshops
|
| 2005 | — | conf |
TCGOV
|
| 2005 | A | conf |
ICWS
|
| 2005 | A | conf |
MoDELS
|
| 2005 | B | conf |
ICWE
|
| 2004 | — | conf |
IASSE
|
| 2004 | — | conf |
WOSIS
|
| 2004 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 2001 | — | conf |
ECC
|