Peter Bertók

According to our database1, Peter Bertók authored at least 67 papers between 1993 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient data perturbation for privacy preserving and accurate data stream mining.
Pervasive and Mobile Computing, 2018

Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.
Future Generation Comp. Syst., 2018

Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining.
CoRR, 2018

MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

2017
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors.
IEEE Cloud Computing, 2017

2016
Access Control and Information Flow Control for Web Services Security.
IJITWE, 2016

The mediator authorization-security model for heterogeneous semantic knowledge bases.
Future Generation Comp. Syst., 2016

2015
Towards an architecture for managing semantic knowledge in semantic repositories.
IJPEDS, 2015

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Computing, 2015

2014
Efficient and effective realtime prediction of drive-by download attacks.
J. Network and Computer Applications, 2014

Synthesising End-to-End Security Protocols.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A solution for privacy-preserving, remote access to sensitive data.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Authorization Control for a Semantic Data Repository through an Inference Policy Engine.
IEEE Trans. Dependable Sec. Comput., 2013

Optimized Energy Management for Mixed Uplink Traffic in LTE UE.
JNW, 2013

An Endorsement Trust Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Building Web services middleware with predictable execution times.
World Wide Web, 2012

µ-Fractal Based Data Perturbation Algorithm For Privacy Protection.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Securing Data Privacy on Mobile Devices in Emergency Health Situations.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

2011
Privacy-Aware Granular Data Access Control For Cross-Domain Data Sharing.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

A Spring Based Framework for Verification of Service Composition.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Building Web Services Middleware with Predictable Service Execution.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010

Pair-Wise Privilege Control for Cross-Domain Private Data Sharing.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

An analytical model of TCP flow in multi-hop wireless networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Security, Privacy and Interoperability in Heterogeneous Systems.
Proceedings of the Collaborative Networks for a Sustainable World, 2010

Using Real-Time Scheduling Principles in Web Service Clusters to Achieve Predictability of Service Execution.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Memory efficient state-space analysis in software model-checking.
Proceedings of the Computer Science 2010, 2010

2009
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Network and Computer Applications, 2009

Modeling of BPEL Composite Services Using Clustered Coloured Petri-Nets.
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009

Information Flow Control for Cooperation Support in Virtual Enterprises.
Proceedings of the Leveraging Knowledge for Innovation in Collaborative Networks, 2009

Achieving Predictability and Service Differentiation in Web Services.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

2008
Similarity-Based SOAP Multicast Protocol to Reduce Bandwith and Latency in Web Services.
IEEE Trans. Services Computing, 2008

Replication of location-dependent data in mobile ad hoc networks.
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2008

Dynamic Adaptation, Composition and Orchestration of Web Services in Virtual Environments.
Proceedings of the Pervasive Collaborative Networks, 2008

2007
Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

eSMP: A Multicast Protocol to Minimize SOAP Network Traffic in Low Bandwidth Environments.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
A Dynamic Label Checking Approach for Information Flow Control in Web Services.
Int. J. Web Service Res., 2006

Cost based web services transaction management.
IJWGS, 2006

An analytical study of cache invalidation algorithms in mobile environments.
Int. J. Pervasive Computing and Communications, 2006

A benchmark on soap's transport protocols performance for mobile applications.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Optimizing Web Services Performance by Using Similarity-Based Multicast Protocol.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2005
Supporting user mobility through cache relocation.
Mobile Information Systems, 2005

Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Protecting Consumer Data in Composite Web Services.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Cost Based Coordination Model for Long Running Transactions in Web Services.
Proceedings of the iiWAS'2005, 2005

Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Improving Data Accessibility For Mobile Clients Through Cooperative Hoarding.
Proceedings of the 21st International Conference on Data Engineering, 2005

Supporting disconnection operations through cooperative hoarding.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2004
Integration of Heterogeneous Web Service Components.
Proceedings of the Web Services: Modeling, Architecture and Infrastructure, 2004

An Hoarding Approach for Supporting Disconnected Write Operations in Mobile Environments.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Mobility-Aware Cache Replacement for Users of Location-Dependent Services.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

An analytical study of object relocation strategies for wireless environments.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Improving Cache Performance in Mobile Computing Networks through Dynamic Object Relocation.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Location-aware cache replacement for mobile environments.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Cost Efficient Broadcast Based Cache Invalidation for Mobile Environments.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003

A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks.
Proceedings of the Distributed Applications and Interoperable Systems, 2003

An Analytical Study of Broadcast Based Cache Invalidation in Mobile Computing Networks.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003

2002
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

2001
Data Access Control in Virtual Organizations - Role-Based Access Control Patterns.
Proceedings of the Digital Enterprise Challenges: Life-Cycle Approach to Management and Production, IFIP TC5 / WG5.2 & WG5.3 Eleventh International PROLAMAT Conference on Digital Enterprise, 2001

APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control.
Proceedings of the 6th European Conference on Pattern Languages of Programms (EuroPLoP '2001), 2001

2000
Collaboration and Application Integration: Distributed Design with Virtual CAD.
Proceedings of the Global Engineering, 2000

Software Technology for Design System Integration.
Proceedings of the Global Engineering, 2000

1997
Working Group Report on Information Infrastructure for Global and Virtual Enterprises.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

Introduction.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

1996
Cooperative design on the Internet.
IFIP World Conference on IT Tools, 1996

1993
Ifip/Ifac International Working Conference On Knowledge-Based Hybrid Systems In Engineering And Manufacturing.
Robotica, 1993


  Loading...