Author of the publication

Run-time generation, transformation, and verification of access control models for self-protection.

, , , , and . SEAMS, page 135-144. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependable Computing., and . J. Braz. Comput. Soc., 10 (3): 3-4 (2005)Software engineering for large-scale multi-agent systems: SELMAS 2003: workshop report., , , , , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 28 (6): 1 (2003)A methodology for the requirements analysis of critical real-time systems.. Newcastle University, Newcastle upon Tyne, UK, (1994)British Library, EThOS.Empirical resilience evaluation of an architecture-based self-adaptive software system., , , and . QoSA, page 63-72. ACM, (2014)Robustness evaluation of the rainbow framework for self-adaptation., , , , and . SAC, page 376-383. ACM, (2014)Micro-controllers: Promoting Structurally Flexible Controllers in Self-Adaptive Software Systems., , , and . CoRR, (2020)Dependable and Secure Distributed Storage System for Ad Hoc Networks., , , , and . ADHOC-NOW, volume 4686 of Lecture Notes in Computer Science, page 142-152. Springer, (2007)Testing of adaptive and context-aware systems: approaches and challenges., , , , and . Softw. Test. Verification Reliab., (2021)The Conflict Between Self-* Capabilities and Predictability.. Self-star Properties in Complex Information Systems, volume 3460 of Lecture Notes in Computer Science, page 219-228. Springer, (2005)Twin Workshops on Architecting Dependable Systems (WADS 2004)., , and . ICSE, page 758. IEEE Computer Society, (2004)