Author of the publication

ASASPXL: New Clother for Analysing ARBAC Policies.

, and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 267-284. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Guaranteeing k-Anonymity in Location Databases., , and . DEXA (1), volume 6860 of Lecture Notes in Computer Science, page 280-287. Springer, (2011)Incremental Analysis of Evolving Administrative Role Based Access Control Policies., and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 260-275. Springer, (2014)A Context-Aware Privacy-Preserving Solution for Location-Based Services., , , and . ACOMP, page 132-139. IEEE Computer Society, (2018)Privacy preserving through a memorizing algorithm in location-based services., , and . MoMM, page 146-153. ACM, (2009)ASASPXL: New Clother for Analysing ARBAC Policies., and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 267-284. (2016)Boosting Model Checking to Analyse Large ARBAC Policies., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 273-288. Springer, (2012)Scalable and precise automated analysis of administrative temporal role-based access control., , and . SACMAT, page 103-114. ACM, (2014)PAPR reduction using contiguous-tone Tone Reservation technique in optical OFDM IMDD transmissions., , , , and . OFC/NFOEC, page 1-3. IEEE, (2013)Differential Privacy in Deep Learning: An Overview., , , , and . ACOMP, page 97-102. IEEE Computer Society, (2019)Anonymizing but Deteriorating Location Databases., and . Polibits, (2012)