Author of the publication

Automated Testing of Security Functions Using a Combined Model and Interface-Driven Approach.

, and . HICSS, IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Model-Based Testing to Assess Smart Card Interoperability Conformance., and . CCCT (2), page 23-28. The International Institute of Informatics and Systemics (IIIS), (2004)Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)., , , and . ABAC@CODASPY, page 13-24. ACM, (2016)The role control center: features and case studies., , , and . SACMAT, page 12-20. ACM, (2003)Application of XML tools for enterprise-wide RBAC implementation tasks.. ACM Workshop on Role-Based Access Control, page 11-18. ACM, (2000)Proposed NIST standard for role-based access control., , , , and . ACM Trans. Inf. Syst. Secur., 4 (3): 224-274 (2001)DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS., , , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 253-272. Springer, (2019)Enterprise access policy enforcement for applications through hybrid models and XSLT technologies.. ICEC, volume 60 of ACM International Conference Proceeding Series, page 490-499. ACM, (2004)Challenges in Securing the Domain Name System., and . IEEE Secur. Priv., 4 (1): 84-87 (2006)Privacy Protection of Enterprise Information through Inference Analysis.. POLICY, page 47-56. IEEE Computer Society, (2005)A Framework for Multiple Authorization Types in a Healthcare Application System.. ACSAC, page 137-148. IEEE Computer Society, (2001)