Author of the publication

Cross-Domain Attribute Conversion for Authentication and Authorization.

, , , , and . ARES, page 652-659. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Metric Semantics for Commit in OR-Parallel Logic Programming., , and . ILPS, page 101-115. MIT Press, (1997)Full Abstractness of a Metric Semantics for Action Refinement., , and . Fundam. Informaticae, 40 (4): 335-382 (1999)A white-box anomaly-based framework for database leakage detection., , , , and . J. Inf. Secur. Appl., (2017)SAFAX - An Extensible Authorization Service for Cloud Environments., , , and . Frontiers ICT, (2015)Verifying Probabilistic Programs Using a Hoare like Logic.. ASIAN, volume 1742 of Lecture Notes in Computer Science, page 113-125. Springer, (1999)Data Governance and Transparency for Collaborative Systems., , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 199-216. Springer, (2016)Principles on the Security of AES against First and Second-Order Differential Power Analysis., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 168-185. (2010)Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents., , , and . IEEE Big Data, page 2999-3008. IEEE, (2023)Functional Principles of Registry-based Service Discovery., , , , and . LCN, page 209-217. IEEE Computer Society, (2005)Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN., , , and . ICCVE, page 1-6. IEEE, (2019)