Author of the publication

A Generic Framework for Representing Context-Aware Security Policies in the Cloud.

, , , , and . CLOSER (Selected Papers), volume 740 of Communications in Computer and Information Science, page 339-359. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Access to Healthcare Data with Context-aware Policies., , , , and . IISA, page 1-6. IEEE, (2020)Data and Cloud Polymorphic Application Modelling in Multi-clouds and Fog Environments., , and . CAiSE, volume 12751 of Lecture Notes in Computer Science, page 449-464. Springer, (2021)Service Adaptation Recommender in the Event Marketplace: Conceptual View, , , and . The Semantic Web: ESWC 2011 Workshops, volume 7117 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-25953-1_16.(2011)Context Management in Event Marketplaces, , , , , and . Joint Proceedings of FEOSW 2012, RED 2012 and SBPM 2012, volume Vol-862 of CEUR Workshop Proceedings, CEUR Workshop Proceedings, (2012)Distributed Complex Event Processing in Multiclouds., , , and . ESOCC, volume 11116 of Lecture Notes in Computer Science, page 105-119. Springer, (2018)Preference-based cloud service recommendation as a brokerage service., , and . CCB@Middleware, page 5:1-5:6. ACM, (2014)A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare Domain., , , , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 1133-1142. Springer, (2020)Fuzzy UTASTAR: A method for discovering utility functions from fuzzy data., , and . Expert Syst. Appl., 38 (12): 15463-15474 (2011)PuLSaR: preference-based cloud service selection for cloud service brokers., , and . J. Internet Serv. Appl., 6 (1): 26:1-26:14 (2015)Accessing electronic health records in critical incidents using context-aware attribute-based access control., , , , and . Intell. Decis. Technol., 15 (4): 667-679 (2021)