Author of the publication

EXAM: An Environment for Access Control Policy Analysis and Management.

, , , , and . POLICY, page 238-240. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Moving Queries over Moving Object Data Streams., , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 563-575. Springer, (2007)Bigger Than We Thought: The Upbit Hack Gang., , and . MARBLE, page 178-185. Springer, (2023)FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree., , and . SACMAT, page 37-48. ACM, (2019)From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing., , , , and . PST, page 337-348. IEEE Computer Society, (2017)Adapting Relational Database Engine to Accommodate Moving Objects in SpADE., , , , and . ICDE, page 1505-1506. IEEE Computer Society, (2007)A Security Enhanced AODV Routing Protocol., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 298-307. Springer, (2005)Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . IEEE Open J. Comput. Soc., (2023)Modeling and Understanding Ethereum Transaction Records via a Complex Network Approach., , , and . CoRR, (2020)T-EDGE: Temporal WEighted MultiDiGraph Embedding for Ethereum Transaction Network Analysis., , , and . CoRR, (2019)Efficient parallel processing of high-dimensional spatial kNN queries., , , , and . Soft Comput., 26 (22): 12291-12316 (2022)