Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+., , and . MeTRiD@ETAPS, volume 272 of EPTCS, page 52-64. (2018)A flexible ICT architecture to support ancillary services in future electricity distribution networks: an accounting use case for DSOs., , , , , , , , , and . Energy Inform., (2020)Access control requirements engineering, modeling and verification in multi-domain grid and cloud computing systems. University of Macedonia Economic and Social Sciences, Greece, (2013)National Archive of PhD Theses: oai:10442/29923.Access Control in the Industrial Internet of Things., , , and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications., , , , and . Computer, 50 (12): 60-71 (2017)Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments., , , and . IEEE Trans. Cloud Comput., 12 (1): 319-336 (January 2024)The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective., , , and . IEEE J. Sel. Areas Commun., 35 (11): 2586-2595 (2017)domRBAC: An access control model for modern collaborative systems., and . Comput. Secur., 31 (4): 540-556 (2012)Human and Organizational Issues for Resilient Communications., , , , , and . Guide to Disaster-Resilient Communication Networks, Springer, (2020)Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud., , , and . CCS, page 3415-3417. ACM, (2022)