Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Policy System for Control of Data Fusion Processes and Derived Data., , and . FUSION, page 807-813. IEEE, (2018)Network prediction in a policy-based IP network., and . GLOBECOM, page 2522-2526. IEEE, (2001)Deployment Time Performance Optimization of Internet Services., , , , and . GLOBECOM, IEEE, (2006)A Policy Service for GRID Computing., , , , and . GRID, volume 2536 of Lecture Notes in Computer Science, page 243-255. Springer, (2002)Secure Model Fusion for Distributed Learning Using Partial Homomorphic Encryption., , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 154-179. Springer, (2018)Service level agreements on IP networks.. Proc. IEEE, 92 (9): 1382-1388 (2004)The Challenge of Access Control Policies Quality., , , , and . ACM J. Data Inf. Qual., 10 (2): 6:1-6:6 (2018)A Scheme for Real-Time Channel Establishment in Wide-Area Networks., and . IEEE J. Sel. Areas Commun., 8 (3): 368-379 (1990)ProFact: A Provenance-Based Analytics Framework for Access Control Policies., , , , , , and . IEEE Trans. Serv. Comput., 14 (6): 1914-1928 (2021)FLAP - A Federated Learning Framework for Attribute-based Access Control Policies., , , , , and . CODASPY, page 263-272. ACM, (2023)