Author of the publication

Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes.

, , and . ICWS, page 535-542. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , and . ESEM, page 24:1-24:8. ACM, (2014)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , and . REFSQ, volume 9013 of Lecture Notes in Computer Science, page 98-114. Springer, (2015)Access control in Internet-of-Things: A survey., , , and . J. Netw. Comput. Appl., (2019)Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain., , , , and . EmpiRE, page 49-56. IEEE Computer Society, (2012)An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , and . EmpiRE, page 28-35. IEEE Computer Society, (2014)Collective privacy management in social networks., , and . WWW, page 521-530. ACM, (2009)Efficient and privacy-preserving enforcement of attribute-based access control., , and . IDtrust, page 63-68. ACM, (2010)Fuzzy-based approach to assess and prioritize privacy risks., , and . Soft Comput., 24 (3): 1553-1563 (2020)PriMa: an effective privacy protection mechanism for social networks., , and . AsiaCCS, page 320-323. ACM, (2010)VeryIDX - A Digital Identity Management System for Pervasive Computing Environments., , , , , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 268-279. Springer, (2008)