Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation., , , and . ISCRAM-med, volume 196 of Lecture Notes in Business Information Processing, page 112-119. Springer, (2014)Checking causal consistency of distributed databases., , , , and . Computing, 104 (10): 2181-2201 (2022)Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis., , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 250-266. Springer, (2019)Towards a session based OrBAC model., and . ICMCS, page 918-923. IEEE, (2012)Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines., , and . CommNet, page 1-10. IEEE, (2019)Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies., , , and . EAI Endorsed Trans. Security Safety, 5 (16): e3 (2018)A framework for dynamic evolution of object-oriented specifications., , and . ICSM, page 96-104. IEEE Computer Society, (1992)Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach., , , and . IEEE BigData, page 5330-5332. IEEE, (2018)ABAC Based Online Collaborations in the Cloud., , and . AFRICATEK, volume 206 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 67-76. Springer, (2017)Adapt Dynamic Evolution in a Reflective Object-Oriented Computer Language., , , and . IEICE Trans. Inf. Syst., 78-D (4): 363-382 (1995)