Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement., , , and . SECRYPT, page 442-449. SCITEPRESS, (2023)Poster: Energy Management in Off-grid Homes by Forecasting., and . IOT, page 207-210. ACM, (2021)Authorization Strategies and Classification of Access Control Models., , , and . FDSE, volume 13076 of Lecture Notes in Computer Science, page 155-174. Springer, (2021)Comparison of Anomaly Detection and Solution Strategies for Household Service Robotics using Knowledge Graphs., , and . IICAIET, page 1-6. IEEE, (2021)Hoffnung im Salz : der Lithium-Schatz von Bolivien, and . ZEIT Wissen,   (5): 86-94 (2012)A study on time models in graph databases for security log analysis., , , and . Int. J. Web Inf. Syst., 17 (5): 427-448 (2021)Extended Authorization Policy for Graph-Structured Data., , , and . SN Comput. Sci., 2 (5): 351 (2021)Authorization Policy Extension for Graph Databases., , , and . FDSE, volume 12466 of Lecture Notes in Computer Science, page 47-66. Springer, (2020)A systematic literature review of authorization and access control requirements and current state of the art for different database models., , , and . Int. J. Web Inf. Syst., 20 (1): 1-23 (2024)Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control., , , , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 431-436. Springer, (2023)