Author of the publication

Run-time generation, transformation, and verification of access control models for self-protection.

, , , , and . SEAMS, page 135-144. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-adaptive federated authorization infrastructures., , and . J. Comput. Syst. Sci., 80 (5): 935-952 (2014)An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability., and . IMSA, page 131-135. IASTED/ACTA Press, (1999)APSIS4all: personalisation as a strategy to ensure accessibility and enhance user experience of public digital terminals., and . W4A, page 31:1-31:2. ACM, (2014)Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models., , and . DASC, page 37-44. IEEE Computer Society, (2011)Neural discrimination of nonprototypical chords in music experts and laymen: an MEG study, , , , , , , and . Journal of cognitive neuroscience, 21 (11): 2230--44 (November 2009)Measuring and comparing the reliability of the structured walkthrough evaluation method with novices and experts., , and . W4A, page 11:1-11:10. ACM, (2014)An educational tool to support the accessibility evaluation process., and . W4A, page 12. ACM, (2010)A lossless data reduction technique for wireless EEG recorders and its use in selective data filtering for seizure monitoring., and . EMBC, page 6186-6189. IEEE, (2015)A Database System For Organising Musique Concrete.. ICMC, Michigan Publishing, (2010)Application of Self-Adaptive techniques to federated authorization models.. ICSE, page 1495-1498. IEEE Computer Society, (2012)