Author of the publication

FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules.

, and . POLICY, page 1-8. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Découverte automatisée de hiérarchies de rôles pour les politiques de contrôle d'accès.. INFORSID, page 139-154. (2007)Integration of Access Control in Information Systems: From Role Engineering to Implementation., and . Informatica (Slovenia), 30 (1): 87-95 (2006)Interactive Mapping Specification with Exemplar Tuples., , , and . SIGMOD Conference, page 667-682. ACM, (2017)Tuple-based access control: a provenance-based information flow control for relational data., , and . SAC, page 2165-2170. ACM, (2015)Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 914-923. Springer, (2006)Intégration du contexte spatio-temporel dans le contrôle d'accès basé sur les rôles ., and . Ingénierie des Systèmes d Inf., 10 (4): 89-117 (2005)Refactoring multi-layered access control policies through (De)composition., and . CNSM, page 243-250. IEEE Computer Society, (2013)Access Control Configuration for J2EE Web Applications: A Formal Perspective., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 30-35. Springer, (2012)Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs., and . ICCS, volume 4068 of Lecture Notes in Computer Science, page 427-440. Springer, (2006)A relational database integrity framework for access control policies., and . J. Intell. Inf. Syst., 38 (1): 131-159 (2012)