Author of the publication

Efficient enforcement of action-aware purpose-based access control within relational database management systems.

, and . ICDE, page 1516-1517. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Management of access control policies for XML document sources., and . Int. J. Inf. Sec., 1 (4): 236-260 (2003)A decentralized temporal autoritzation model., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 271-280. Chapman & Hall, (1996)A system for controlled outsourcing of personal data., and . Comput. Syst. Sci. Eng., (2006)Specifying and enforcing access control policies for XML document sources., , , and . World Wide Web, 3 (3): 139-151 (2000)Content-Based Filtering of Web Documents: The Ma$X$ System and the EUFORBIA Project, , and . International Journal of Information Security, 2 (1): 45-58 (November 2003)Privacy-Preserving Enhanced Collaborative Tagging, , , , and . IEEE Transactions on Knowledge and Data Engineering, 26 (1): 180-193 (January 2014)Security and Privacy in Social Networks, , and . Encyclopedia of Information Science and Technology, Second ed., VII, IGI Global, Hershey, PA, (2008)Enforcing access control in Web-based social networks., , and . ACM Trans. Inf. Syst. Secur., 13 (1): 6:1-6:38 (2009)A framework to enforce access control over data streams., , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs., , and . CIC, page 36-45. IEEE Computer Society, (2015)