Peter Bertók
Orcid: 0000-0003-4365-0305
According to our database1,
Peter Bertók
authored at least 76 papers
between 1993 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Comput. Commun., 2021
2020
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2020
Comput. Secur., 2020
2019
An efficient and scalable privacy preserving algorithm for big data and data streams.
Comput. Secur., 2019
2018
Pervasive Mob. Comput., 2018
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.
Future Gener. Comput. Syst., 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
2017
IEEE Cloud Comput., 2017
2016
Int. J. Inf. Technol. Web Eng., 2016
The mediator authorization-security model for heterogeneous semantic knowledge bases.
Future Gener. Comput. Syst., 2016
2015
Int. J. Parallel Emergent Distributed Syst., 2015
IEEE Cloud Comput., 2015
2014
J. Netw. Comput. Appl., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
Authorization Control for a Semantic Data Repository through an Inference Policy Engine.
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
World Wide Web, 2012
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
2011
Proceedings of the Pacific Asia Conference on Information Systems, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010
Proceedings of the Pacific Asia Conference on Information Systems, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the Collaborative Networks for a Sustainable World, 2010
Using Real-Time Scheduling Principles in Web Service Clusters to Achieve Predictability of Service Execution.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010
Proceedings of the Computer Science 2010, 2010
2009
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Netw. Comput. Appl., 2009
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009
Proceedings of the Leveraging Knowledge for Innovation in Collaborative Networks, 2009
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009
2008
Similarity-Based SOAP Multicast Protocol to Reduce Bandwith and Latency in Web Services.
IEEE Trans. Serv. Comput., 2008
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2008
Dynamic Adaptation, Composition and Orchestration of Web Services in Virtual Environments.
Proceedings of the Pervasive Collaborative Networks, 2008
2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
eSMP: A Multicast Protocol to Minimize SOAP Network Traffic in Low Bandwidth Environments.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
2006
Int. J. Web Serv. Res., 2006
Int. J. Pervasive Comput. Commun., 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006
2005
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Protecting Consumer Data in Composite Web Services.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
A Cost Based Coordination Model for Long Running Transactions in Web Services.
Proceedings of the iiWAS'2005, 2005
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005
2004
Integration of Heterogeneous Web Service Components.
Proceedings of the Web Services: Modeling, Architecture and Infrastructure, 2004
An Hoarding Approach for Supporting Disconnected Write Operations in Mobile Environments.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Improving Cache Performance in Mobile Computing Networks through Dynamic Object Relocation.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003
Proceedings of the Distributed Applications and Interoperable Systems, 2003
An Analytical Study of Broadcast Based Cache Invalidation in Mobile Computing Networks.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003
2002
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002
2001
Data Access Control in Virtual Organizations - Role-Based Access Control Patterns.
Proceedings of the Digital Enterprise Challenges: Life-Cycle Approach to Management and Production, IFIP TC5 / WG5.2 & WG5.3 Eleventh International PROLAMAT Conference on Digital Enterprise, 2001
APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control.
Proceedings of the 6th European Conference on Pattern Languages of Programms (EuroPLoP '2001), 2001
2000
Collaboration and Application Integration: Distributed Design with Virtual CAD.
Proceedings of the Global Engineering, 2000
Software Technology for Design System Integration.
Proceedings of the Global Engineering, 2000
1997
Working Group Report on Information Infrastructure for Global and Virtual Enterprises.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
1996
Cooperative design on the Internet.
Proceedings of the Advanced IT Tools, 1996
1993
Ifip/Ifac International Working Conference On Knowledge-Based Hybrid Systems In Engineering And Manufacturing.
Robotica, 1993