Author of the publication

An Automata-Based Approach to Evolving Privacy Policies for Social Networks.

, , , and . RV, volume 10012 of Lecture Notes in Computer Science, page 285-301. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Privacy Policies to Enhance Informed Consent (Extended Version)., and . CoRR, (2019)A Specification Logic for Programs in the Probabilistic Guarded Command Language (Extended Version)., , , and . CoRR, (2022)Analysis of Privacy Policies to Enhance Informed Consent., and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 177-198. Springer, (2019)Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis., , , and . CoRR, (2020)How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming., , , , and . IWSPA@CODASPY, page 55-65. ACM, (2022)Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 417-438. Springer, (2021)Computational analysis of Canny & Binary Fuzzy Rough Set model based on Triangle Modulus Edge Detectors., and . ICCI*CC, page 305-312. IEEE Computer Society, (2012)SoK: Three Facets of Privacy Policies., and . WPES@CCS, page 41-56. ACM, (2020)Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores., , , , , , , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 103-119. Springer, (2022)GPU Powered ROSA Analyzer., , and . ICPP, page 901-908. IEEE Computer Society, (2013)