Author of the publication

Runtime support for rule-based access-control evaluation through model-transformation.

, , and . SLE, page 57-69. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Access Control Models for Conversational User Interfaces., , , and . BPMDS/EMMSAD@CAiSE, volume 450 of Lecture Notes in Business Information Processing, page 310-317. Springer, (2022)An analysis of software design understanding & motivation of engineering students., , , , , and . MoDELS (Companion), page 123-130. ACM, (2022)Runtime support for rule-based access-control evaluation through model-transformation., , and . SLE, page 57-69. ACM, (2016)Lazy Execution of Model-to-Model Transformations., , , and . MoDELS, volume 6981 of Lecture Notes in Computer Science, page 32-46. Springer, (2011)A model-driven approach for the extraction of network access-control policies., , , , and . MDsec@MoDELS, page 5. ACM, (2012)Enabling the Reuse of Stored Model Transformations Through Annotations., , , and . ICMT, volume 9152 of Lecture Notes in Computer Science, page 43-58. Springer, (2015)Monitoring Association Constraints in Model-Oriented Programming., , , and . MoDELS (Companion), page 375-380. IEEE, (2023)Parallel Execution of ATL Transformation Rules., , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 656-672. Springer, (2013)ModelSET Component Framework: Refinando el Ciclo de Vida de MDA., , , , and . JISBD, page 174-177. (2009)Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems., , , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 218-233. Springer, (2015)