Author of the publication

Assessment of Access Control Systems Using Mutation Testing.

, , and . TELERISE@ICSE, page 8-13. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GDPR and business processes: an effective solution., , and . APPIS, page 7:1-7:5. ACM, (2019)The X-CREATE Framework - A Comparison of XACML Policy Testing Strategies., , , and . WEBIST, page 155-160. SciTePress, (2012)Monitoring of Access Control Policy for Refinement and Improvements., , and . SWQD, volume 302 of Lecture Notes in Business Information Processing, page 17-36. Springer, (2018)Issues and Challenges of Access Control in the Cloud., and . WEBIST, page 261-268. SciTePress, (2018)Enhancing Business Process Performance Analysis through Coverage-Based Monitoring., , , and . QUATIC, page 35-43. IEEE Computer Society, (2016)Improving SAR ops using Wi-Fi and LoRa on UAV., and . PerCom Workshops, page 82-84. IEEE, (2022)Predictive Simulation for Building Trust Within Service-Based Ecosystems., , and . PerCom Workshops, page 34-37. IEEE, (2022)MENTORS: Monitoring Environment for System of Systems., , and . WEBIST, page 291-298. SCITEPRESS, (2021)Integrating Access Control and Business Process for GDPR Compliance: A Preliminary Study., , and . ITASEC, volume 2315 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A Life Cycle for Authorization Systems Development in the GDPR Perspective., and . ITASEC, volume 2597 of CEUR Workshop Proceedings, page 128-140. CEUR-WS.org, (2020)