Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification and enforcement in distributed usage control.. ETH Zurich, Zürich, Switzerland, (2007)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/72751).DUKE - Distributed Usage Control Enforcement., , , and . POLICY, page 275. IEEE Computer Society, (2007)On Obligations., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 98-117. Springer, (2005)Usage Control Requirements in Mobile and Ubiquitous Computing Applications., , , and . ICSNC, page 27. IEEE Computer Society, (2006)Mechanisms for usage control., , , , and . AsiaCCS, page 240-244. ACM, (2008)A Policy Language for Distributed Usage Control., , , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 531-546. Springer, (2007)Distributed usage control., , and . Commun. ACM, 49 (9): 39-44 (2006)Usage Control in Service-Oriented Architectures., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 83-93. Springer, (2007)Usage Control Enforcement: Present and Future., , , , and . IEEE Secur. Priv., 6 (4): 44-53 (2008)Monitors for Usage Control., , , , and . IFIPTM, volume 238 of IFIP, page 411-414. Springer, (2007)