Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for the Validation of Access Control Systems., , and . ETAA@ESORICS, volume 11967 of Lecture Notes in Computer Science, page 35-51. Springer, (2019)An automated framework for continuous development and testing of access control systems., , and . J. Softw. Evol. Process., (March 2023)Access Control Policy Coverage Assessment Through Monitoring., , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 373-383. Springer, (2017)A Toolchain for Designing and Testing Access Control Policies., , , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)A Decentralized Solution for Combinatorial Testing of Access Control Engine., , and . ICISSP, page 126-135. SciTePress, (2019)Model-based Learning Assessment Management., , , , and . MODELSWARD, page 743-752. SciTePress, (2016)EDUFYSoS: A Factory of Educational System of Systems Case Studies., , , , and . SoSE, page 205-210. IEEE, (2020)Assessment of Access Control Systems Using Mutation Testing., , and . TELERISE@ICSE, page 8-13. IEEE Computer Society, (2015)Towards a Model-Driven Infrastructure for Runtime Monitoring., , , , and . SERENE, volume 6968 of Lecture Notes in Computer Science, page 130-144. Springer, (2011)Towards Automated Deployment of Self-adaptive Applications on Hybrid Clouds (Short Paper)., , , , , , , , , and 3 other author(s). SEFM, volume 10469 of Lecture Notes in Computer Science, page 388-393. Springer, (2017)