Ali Nasrat Haidar
According to our database1,
Ali Nasrat Haidar
authored at least 13 papers
between 2008 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Flexible composition and execution of large scale applications on distributed e-infrastructures.
J. Comput. Sci., 2014
2013
A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service.
J. Internet Serv. Appl., 2013
2012
IMENSE: An e-infrastructure environment for patient specific multiscale data integration, modelling and clinical treatment.
J. Comput. Sci., 2012
A Comparative Analysis of the Usability and Legal Implications of Different Patient Data Sharing Architectures.
Proceedings of the AMIA 2012, 2012
2011
Audited credential delegation: a usable identity management solution for grid environments.
Proceedings of the 2011 TeraGrid Conference - Extreme Digital Discovery, 2011
2010
Audited credential delegation - a user-centric identity management solution for computational grid environments.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009
2008
Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, 2008
Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP.
Proceedings of the 32nd Annual IEEE Software Engineering Workshop, 2008
Proceedings of the Leveraging Applications of Formal Methods, 2008
Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion.
Proceedings of the Leveraging Applications of Formal Methods, 2008
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008