Author of the publication

A role-based access control model for protection domain derivation and management.

, , , and . ACM Workshop on Role-Based Access Control, page 95-106. ACM, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uniform Co-Scheduling Using Object-Oriented Design Techniques., and . Decentralized and Distributed Systems, volume A-39 of IFIP Transactions, page 317-328. North-Holland, (1993)JVer: A Java Verifier., , , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 144-147. Springer, (2005)Dynamic Partitioning in Different Distributed-Memory Environments., , and . JSSPP, volume 1162 of Lecture Notes in Computer Science, page 244-270. Springer, (1996)A Flexible Security System for Using Internet Content., , , and . IEEE Softw., 14 (5): 52-59 (1997)On-Device Mobile Phone Security Exploits Machine Learning., , and . IEEE Pervasive Comput., 16 (2): 92-96 (2017)From Smart to Autonomous Phones.. IEEE Pervasive Comput., 3 (3): 102-104 (2004)Smartphones: Past, Present, and Future., and . IEEE Pervasive Comput., 13 (4): 89-92 (2014)JavaScript instrumentation for browser security., , , and . POPL, page 237-249. ACM, (2007)AOE: A Mobile Operating Environment for Web-Based Applications., , , , and . SAINT, page 15-24. IEEE Computer Society, (2004)Designing and Implementing Choices: An Object-Oriented System in C++., , , and . Commun. ACM, 36 (9): 117-126 (1993)