Author of the publication

Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services.

, and . TrustCom, page 1223-1230. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Trustable Remote Monitoring and Management Systems., , and . UCC Companion, page 213-219. IEEE, (2018)InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version)., , and . CoRR, (2018)Special issue: Reconfigurable wireless communication systems., and . Wirel. Commun. Mob. Comput., 2 (8): 785-787 (2002)5G: Service Continuity in Heterogeneous Environments., and . Wireless Personal Communications, 57 (3): 413-429 (2011)License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys., , and . WINSYS, page 333-338. INSTICC Press, (2006)Integrating Mobile Devices into Semantic Services Environments, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)A Methodology for Security Classification applied to Smart Grid Infrastructures., , , and . Int. J. Crit. Infrastructure Prot., (2020)Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)Bridging the Digital Divide: Challenges in Opening the Digital World to the Elderly, Poor, and Digitally Illiterate., , , and . IEEE Consumer Electron. Mag., 8 (1): 78-81 (2019)Sociality brings Security in Content Sharing., , , and . J. Comput., 5 (12): 1839-1846 (2010)