Author of the publication

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.

, , , , and . WEBIST (Revised Selected Papers), volume 372 of Lecture Notes in Business Information Processing, page 78-98. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Preserving Data Privacy in e-Health., , , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement., , , , and . WEBIST (Revised Selected Papers), volume 372 of Lecture Notes in Business Information Processing, page 78-98. Springer, (2018)Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control., , , , , , , and . IEEE Communications Magazine, 58 (7): 65-71 (2020)Federation and Security Aspects for the Management of the EHR in Italy., , , , , and . ADNTIIC, volume 7547 of Lecture Notes in Computer Science, page 26-37. Springer, (2011)Exploiting Blockchain Technology for Attribute Management in Access Control Systems., , , and . GECON, volume 11819 of Lecture Notes in Computer Science, page 3-14. Springer, (2019)Enhancing Security in ETSI Open Source MANO with Usage Control Capability., , , , , , , and . IM, page 25-29. IFIP, (2019)A prototype for solving conflicts in XACML-based e-Health policies., , , and . CBMS, page 449-452. IEEE Computer Society, (2013)