Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile., , , and . TELERISE@ICSE, page 2-7. IEEE Computer Society, (2015)Data disclosure risk evaluation., , , and . CRiSIS, page 35-72. IEEE, (2009)Dissuading Stolen Password Reuse., and . ETAA@ESORICS, volume 11263 of Lecture Notes in Computer Science, page 116-128. Springer, (2018)Monitoring Leaked Confidential Data.. NTMS, page 1-5. IEEE, (2019)Mining social networks for software vulnerabilities monitoring., , , , , , , and . NTMS, page 1-7. IEEE, (2015)On the Impact of DoS Attacks on Secure Service Discovery., , and . EUC (2), page 532-537. IEEE Computer Society, (2008)978-0-7695-3492-3.A Privacy Preserving Framework for Mobile and Cloud., , , and . MOBILESoft, page 160-161. IEEE Computer Society, (2015)Sociocultural Influences for Password Definition: An AI-based Study., , and . ICISSP, page 542-549. SCITEPRESS, (2021)Obligation Based Access Control., and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 108-116. Springer, (2014)Context-Aware Security Policy for the Service Discovery., , and . AINA Workshops (1), page 477-482. IEEE Computer Society, (2007)