Author of the publication

Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.

, , , , and . Proc. Priv. Enhancing Technol., 2017 (1): 118-131 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DLoc: Distributed Auditing for Data Location Compliance in Cloud., , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 202-218. Springer, (2017)Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data., , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 151-164. Springer, (2019)Rewrite Based Specification of Access Control Policies., , and . SecReT@LICS/CSF, volume 234 of Electronic Notes in Theoretical Computer Science, page 37-54. Elsevier, (2008)Analysis of Rewrite-Based Access Control Policies., , and . SecReT@LICS/CSF, volume 234 of Electronic Notes in Theoretical Computer Science, page 55-75. Elsevier, (2008)ROCK Algorithm Parallelization with TOREADOR Primitives., , , , and . AINA Workshops, page 402-407. IEEE Computer Society, (2018)A risk assessment model for selecting cloud service providers., , , and . J. Cloud Comput., (2016)Modular Access Control Via Strategic Rewriting., , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 578-593. Springer, (2007)A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses., , , , and . CoRR, (2023)AAL and Static Conflict Detection in Policy., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 367-382. (2016)Réécriture et Modularité pour les Politiques de Sécurité. (Term Rewriting and Modularity for Security Policies).. Henri Poincaré University, Nancy, France, (2008)