Author of the publication

Visualising Access Control: The PRISM Approach.

, , , , , and . Panhellenic Conference on Informatics, page 107-111. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified signalling using SIP in a B3G system., , , , , and . PIMRC, page 1667-1671. IEEE, (2005)On the design of a privacy aware authorization engine for collaborative environments., , , , , and . Electron. Mark., 24 (2): 101-112 (2014)Privacy-Aware Passive Network Monitoring., , , , , and . Panhellenic Conference on Informatics, page 171-175. IEEE Computer Society, (2009)Routing in Content-Centric Networks: From Names to Concepts., , , , , and . NTMS, page 1-5. IEEE, (2012)A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring., , , , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 295-302. Springer, (2011)A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress., , , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 208-217. Springer, (2011)Towards Privacy-Preserving Network Monitoring: Issues and Challenges., , , , , , , , and . PIMRC, page 1-5. IEEE, (2007)Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures., , , , , and . CIT, page 1114-1121. IEEE Computer Society, (2010)A semantic framework for privacy-aware access control., , , , , and . IMCSIT, page 813-820. IEEE, (2008)Combining Monitoring and Privacy-Protection Perspectives in a Semantic Model for IP Traffic Measurements., , , , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 187-190. Springer, (2010)