Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schedulers and Finishers: On Generating the Behaviours of an Event Structure., , and . ICTAC, volume 9965 of Lecture Notes in Computer Science, page 121-138. (2016)Abstract Hidden Markov Models: a monadic account of quantitative information flow., , and . CoRR, (2017)Weak Concurrent Kleene Algebra with Application to Algebraic Verification, , and . CoRR, (2013)Probabilistic Concurrent Kleene Algebra., , and . QAPL, volume 117 of EPTCS, page 97-115. (2013)Categorical Information Flow., , , and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 329-343. Springer, (2019)Policy-Based Access Control for Constrained Healthcare Resources., , , and . WOWMOM, page 588-599. IEEE Computer Society, (2018)An Event Structure Model for Probabilistic Concurrent Kleene Algebra., , and . LPAR, volume 8312 of Lecture Notes in Computer Science, page 653-667. Springer, (2013)On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems., , , and . MobiQuitous, page 432-441. ACM, (2017)Design and implementation of a secure and flexible access-right delegation for resource constrained environments., , and . Future Gener. Comput. Syst., (2019)Abstract Hidden Markov Models: a monadic account of quantitative information flow., , and . Logical Methods in Computer Science, (2019)