Author of the publication

A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application.

, , and . IM, page 643-648. IFIP, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)Proposed Model for a Cybersecurity Centre of Innovation for South Africa., , , and . HCC, volume 431 of IFIP Advances in Information and Communication Technology, page 293-306. Springer, (2014)Visualization of a data leak., , and . ISSA, page 1-8. IEEE, (2013)Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks., , , , and . Sensors, 23 (24): 9856 (December 2023)Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet!, , , , and . OZCHI, page 492-505. ACM, (2020)Government Mobile Apps: Analysing Citizen Feedback via App Reviews., , , and . ASE, page 1858-1863. IEEE, (2023)Towards Improving the Adoption and Usage of National Digital Identity Systems., , , , and . ASE, page 223:1-223:6. ACM, (2022)Simulating cyber security management: A gamified approach to executive decision making., , , and . ASE, page 222:1-222:8. ACM, (2022)On the viability of pro-active automated PII breach detection: A South African case study., , and . SAICSIT, page 251. ACM, (2014)Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer., , , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 185-200. Springer, (2020)