Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring integrity on mobile phone systems., , , , and . SACMAT, page 155-164. ACM, (2008)DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers., , and . POLICY, page 95-102. IEEE Computer Society, (2010)A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution., , and . EC2ND, page 1-8. IEEE Computer Society, (2011)Translating Hereditary and Familial Cancer Guidelines into Clinical Decision Support., , , , and . AMIA, AMIA, (2016)An architecture for enforcing end-to-end access control over web applications., , , , , , , and . SACMAT, page 163-172. ACM, (2010)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Integrity walls: finding attack surfaces from mandatory access control policies., , , , and . AsiaCCS, page 75-76. ACM, (2012)Seeding clouds with trust anchors., , , , and . CCSW, page 43-46. ACM, (2010)Network-Based Root of Trust for Installation., , , and . IEEE Secur. Priv., 9 (1): 40-48 (2011)Shroud: ensuring private access to large-scale data in the data center., , , , and . FAST, page 199-214. USENIX, (2013)