Author of the publication

Access Control and Authorization Constraints for WS-BPEL.

, , and . ICWS, page 275-284. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical and efficient cryptographic enforcement of interval-based access control policies.. ACM Trans. Inf. Syst. Secur., 14 (1): 14:1-14:30 (2011)A reference monitor for workflow systems with constrained task execution.. SACMAT, page 38-47. ACM, (2005)Valued Authorization Policy Existence Problem: Theory and Experiments., , , , and . CoRR, (2021)Revocation in Publicly Verifiable Outsourced Computation., , , and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)Understanding and developing role-based administrative models.. CCS, page 158-167. ACM, (2005)Access Control in Publicly Verifiable Outsourced Computation., , , and . AsiaCCS, page 657-662. ACM, (2015)Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies., , , and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 330-345. Springer, (2015)Tree-Based Cryptographic Access Control., , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 47-64. Springer, (2017)A Framework for the Cryptographic Enforcement of Information Flow Policies., , and . SACMAT, page 143-154. ACM, (2017)On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval., , and . SACMAT, page 99-109. ACM, (2015)