Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Unspecified Emergencies for Controlled Information Sharing., , and . IEEE Trans. Dependable Secur. Comput., 13 (6): 630-643 (2016)Enforcing Obligations within RelationalDatabase Management Systems., and . IEEE Trans. Dependable Secur. Comput., 11 (4): 318-331 (2014)PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things., , , and . Comput. Networks, (2021)Knowledge-based approaches for identity management in online social networks., , and . WIREs Data Mining Knowl. Discov., (2018)An extended access control mechanism exploiting data dependencies., , and . Int. J. Inf. Sec., 16 (1): 75-89 (2017)PP-trust-X: A system for privacy preserving trust negotiations., , , , and . ACM Trans. Inf. Syst. Secur., 10 (3): 12 (2007)Guest Editorial: Special Section on the International Conference on Data Engineering., , and . IEEE Trans. Knowl. Data Eng., 28 (2): 295-296 (2016)Privacy-Preserving Enhanced Collaborative Tagging., , , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 180-193 (2014)A Content-Based Authorization Model for Digital Libraries., , , and . IEEE Trans. Knowl. Data Eng., 14 (2): 296-315 (2002)Conceptual Framework and Architecture for Privacy Audit., , , , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 17-40. Springer, (2012)