Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Pre-shared Keys in Closed Implementations of TLS., , and . DATA, page 192-199. SciTePress, (2017)SPDC: Secure Proxied Database Connectivity., , and . DATA, page 56-66. SciTePress, (2017)Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model., , and . SECRYPT, page 292-301. SciTePress, (2016)Server-Side Database Credentials: A Security Enhancing Approach for Database Access., , and . DATA (Revised Selected Papers), volume 814 of Communications in Computer and Information Science, page 215-236. Springer, (2017)Role-Based Access control mechanisms., , and . ISCC, page 1-7. IEEE Computer Society, (2014)On the Prospect of using Cognitive Systems to Enforce Data Access Control., , , and . IoTBDS, page 412-418. SciTePress, (2017)SeqBAC: A Sequence-Based Access Control Model (S)., , and . SEKE, page 276-275. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)Mediator framework for inserting xDRs into Hadoop., , , , and . ISCC, page 547-554. IEEE Computer Society, (2016)Extending RBAC Model to Control Sequences of CRUD Expressions., , and . SEKE, page 463-469. Knowledge Systems Institute Graduate School, (2014)The XACML Standard - Addressing Architectural and Security Aspects., , , and . IoTBDS, page 189-197. SciTePress, (2017)