Author of the publication

Rigorous Analysis of UML Access Control Policy Models.

, , and . POLICY, page 9-16. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling., , , , , and . GEMOC+MPM@MoDELS, volume 1511 of CEUR Workshop Proceedings, page 22-31. CEUR-WS.org, (2015)Enforcing spatio-temporal access control in mobile applications., , and . Computing, 96 (4): 313-353 (2014)Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models., , and . HASE, page 9-16. IEEE Computer Society, (2011)Analyzing Behavioral Aspects of UML Design Class Models against Temporal Properties., , and . QSIC, page 196-201. IEEE, (2014)XMI2USE: A Tool for Transforming XMI to USE Specifications., , , and . ER Workshops, volume 5833 of Lecture Notes in Computer Science, page 147-156. Springer, (2009)A property-based verification approach in aspect-oriented modeling., , and . SAC, page 545-546. ACM, (2009)Rigorous Analysis of UML Access Control Policy Models., , and . POLICY, page 9-16. IEEE Computer Society, (2011)Analyzing Behavioral Refactoring of Class Models., , and . ME@MoDELS, volume 1090 of CEUR Workshop Proceedings, page 70-79. CEUR-WS.org, (2013)On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices., , , and . Future Gener. Comput. Syst., (2018)Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models., , , and . J. Univers. Comput. Sci., 16 (17): 2435-2454 (2010)