What is the Difference Between a Public-Key Infrastructure and a Certification Authority? ,
Distributed Authentication in Kerberos using Public key cryptography ,
Business processes Security ,
Dynamic Business-managed Information systems, 2008. ,
Supplier selection and Business process improvement, doctoral thesis, 2005. ,
DOI : 10.1504/ijsom.2009.023234
Process selection for Business Process Management in a mobile telecommunications company, University of Illinois at, International Journal of Information Technologies and Management, pp.382-399, 2009. ,