Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separation of Duties in Computerized Information Systems.. DBSec, page 179-190. North-Holland, (1990)Polyinstantiation Integrity in Multilevel Relations Revisited., and . DBSec, page 297-308. North-Holland, (1990)Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things., and . SACMAT, page 193-204. ACM, (2018)A logical specification for usage control., , , and . SACMAT, page 1-10. ACM, (2004)Toward a Usage-Based Security Framework for Collaborative Computing Systems., , , and . ACM Trans. Inf. Syst. Secur., 11 (1): 3:1-3:36 (2008)Formal model and policy specification of usage control., , , and . ACM Trans. Inf. Syst. Secur., 8 (4): 351-387 (2005)The UCONABC usage control model., and . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture., and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 403-428. Springer, (1994)Future Directions in Role-Based Access Control Models.. MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 22-26. Springer, (2001)RABAC: Role-Centric Attribute-Based Access Control., , and . MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 84-96. Springer, (2012)