Peter Bertók
According to our database1, Peter Bertók
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.
Future Generation Comp. Syst., 2018
2017
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors.
IEEE Cloud Computing, 2017
2016
Access Control and Information Flow Control for Web Services Security.
IJITWE, 2016
The mediator authorization-security model for heterogeneous semantic knowledge bases.
Future Generation Comp. Syst., 2016
2015
Towards an architecture for managing semantic knowledge in semantic repositories.
IJPEDS, 2015
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Computing, 2015
2014
Efficient and effective realtime prediction of drive-by download attacks.
J. Network and Computer Applications, 2014
Synthesising End-to-End Security Protocols.
Proceedings of the 13th IEEE International Conference on Trust, 2014
A solution for privacy-preserving, remote access to sensitive data.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
Authorization Control for a Semantic Data Repository through an Inference Policy Engine.
IEEE Trans. Dependable Sec. Comput., 2013
Optimized Energy Management for Mixed Uplink Traffic in LTE UE.
JNW, 2013
An Endorsement Trust Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Building Web services middleware with predictable execution times.
World Wide Web, 2012
µ-Fractal Based Data Perturbation Algorithm For Privacy Protection.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012
Securing Data Privacy on Mobile Devices in Emergency Health Situations.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
2011
Privacy-Aware Granular Data Access Control For Cross-Domain Data Sharing.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
A Spring Based Framework for Verification of Service Composition.
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Building Web Services Middleware with Predictable Service Execution.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010
Pair-Wise Privilege Control for Cross-Domain Private Data Sharing.
Proceedings of the Pacific Asia Conference on Information Systems, 2010
An analytical model of TCP flow in multi-hop wireless networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Security, Privacy and Interoperability in Heterogeneous Systems.
Proceedings of the Collaborative Networks for a Sustainable World, 2010
Using Real-Time Scheduling Principles in Web Service Clusters to Achieve Predictability of Service Execution.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010
Memory efficient state-space analysis in software model-checking.
Proceedings of the Computer Science 2010, 2010
2009
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Network and Computer Applications, 2009
Modeling of BPEL Composite Services Using Clustered Coloured Petri-Nets.
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009
Information Flow Control for Cooperation Support in Virtual Enterprises.
Proceedings of the Leveraging Knowledge for Innovation in Collaborative Networks, 2009
Achieving Predictability and Service Differentiation in Web Services.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009
2008
Similarity-Based SOAP Multicast Protocol to Reduce Bandwith and Latency in Web Services.
IEEE Trans. Services Computing, 2008
Replication of location-dependent data in mobile ad hoc networks.
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2008
Dynamic Adaptation, Composition and Orchestration of Web Services in Virtual Environments.
Proceedings of the Pervasive Collaborative Networks, 2008
2007
Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
eSMP: A Multicast Protocol to Minimize SOAP Network Traffic in Low Bandwidth Environments.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
2006
A Dynamic Label Checking Approach for Information Flow Control in Web Services.
Int. J. Web Service Res., 2006
Cost based web services transaction management.
IJWGS, 2006
An analytical study of cache invalidation algorithms in mobile environments.
Int. J. Pervasive Computing and Communications, 2006
A benchmark on soap's transport protocols performance for mobile applications.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Optimizing Web Services Performance by Using Similarity-Based Multicast Protocol.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006
2005
Supporting user mobility through cache relocation.
Mobile Information Systems, 2005
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Protecting Consumer Data in Composite Web Services.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
A Cost Based Coordination Model for Long Running Transactions in Web Services.
Proceedings of the iiWAS'2005, 2005
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Improving Data Accessibility For Mobile Clients Through Cooperative Hoarding.
Proceedings of the 21st International Conference on Data Engineering, 2005
Supporting disconnection operations through cooperative hoarding.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
2004
Integration of Heterogeneous Web Service Components.
Proceedings of the Web Services: Modeling, Architecture and Infrastructure, 2004
An Hoarding Approach for Supporting Disconnected Write Operations in Mobile Environments.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Mobility-Aware Cache Replacement for Users of Location-Dependent Services.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
An analytical study of object relocation strategies for wireless environments.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Improving Cache Performance in Mobile Computing Networks through Dynamic Object Relocation.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Location-aware cache replacement for mobile environments.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Cost Efficient Broadcast Based Cache Invalidation for Mobile Environments.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003
A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks.
Proceedings of the Distributed Applications and Interoperable Systems, 2003
An Analytical Study of Broadcast Based Cache Invalidation in Mobile Computing Networks.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003
2002
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002
2001
Data Access Control in Virtual Organizations - Role-Based Access Control Patterns.
Proceedings of the Digital Enterprise Challenges: Life-Cycle Approach to Management and Production, IFIP TC5 / WG5.2 & WG5.3 Eleventh International PROLAMAT Conference on Digital Enterprise, 2001
APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control.
Proceedings of the 6th European Conference on Pattern Languages of Programms (EuroPLoP '2001), 2001
2000
Collaboration and Application Integration: Distributed Design with Virtual CAD.
Proceedings of the Global Engineering, 2000
Software Technology for Design System Integration.
Proceedings of the Global Engineering, 2000
1997
Working Group Report on Information Infrastructure for Global and Virtual Enterprises.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Introduction.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
1996
Cooperative design on the Internet.
IFIP World Conference on IT Tools, 1996
1993
Ifip/Ifac International Working Conference On Knowledge-Based Hybrid Systems In Engineering And Manufacturing.
Robotica, 1993