Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-based security management for federated healthcare databases (or RHIOs)., , and . HIKM, page 41-48. ACM, (2006)X-GTRBAC admin: a decentralized administration model for enterprise wide access control., , , and . SACMAT, page 78-86. ACM, (2004)X-FEDERATE: A Policy Engineering Framework for Federated Access Management., , and . IEEE Trans. Software Eng., 32 (5): 330-346 (2006)XML-Based Specification for Web Services Document Security., , , and . Computer, 37 (4): 41-49 (2004)Engineering a Policy-Based System for Federated Healthcare Databases., , , , and . IEEE Trans. Knowl. Data Eng., 19 (9): 1288-1304 (2007)X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control., , , and . ACM Trans. Inf. Syst. Secur., 8 (2): 187-227 (2005)Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement., and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 158-173. Springer, (2007)Distributed Access Management in Multimedia IDCs., , , and . Computer, 38 (9): 60-69 (2005)A Trust-based Context-Aware Access Control Model for Web-Services., , and . ICWS, page 184-191. IEEE Computer Society, (2004)X-gtrbac admin: A decentralized administration model for enterprise-wide access control., , , , and . ACM Trans. Inf. Syst. Secur., 8 (4): 388-423 (2005)