Author of the publication

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.

, , , , , , , , , , , and . POLICY, page 247-249. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A policy based role framework for access control., , , and . ACM Workshop on Role-Based Access Control, ACM, (1995)LTSA-PCA: tool support for compositional reliability analysis., , and . ICSE Companion, page 548-551. ACM, (2014)Ponder2 - Policy-Based Self Managed Cells., and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 230. Springer, (2007)The Ponder Policy Specification Language., , , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 18-38. Springer, (2001)An Efficient Access Control Model for Mobile Ad-Hoc Communities., and . SPC, volume 3450 of Lecture Notes in Computer Science, page 210-224. Springer, (2005)A Policy Language for the Management of Distributed Agents., , , and . AOSE, volume 2222 of Lecture Notes in Computer Science, page 84-100. Springer, (2001)Policy refinement: Decomposition and operationalization for dynamic domains., , , , and . CNSM, page 1-9. IEEE, (2011)Autonomous Pervasive Systems and the Policy Challenges of a Small World!, , , and . POLICY, page 3-7. IEEE Computer Society, (2007)Finger: An efficient policy system for body sensor networks., , , , , , and . MASS, page 428-433. IEEE Computer Society, (2008)Model-based Self-Adaptive Components: A preliminary approach., and . ICCSW, volume DTR11-9 of Department of Computing Technical Report, page 73-72. Imperial College London, (2011)