Author of the publication

Controlling Data Flow with a Policy-Based Programming Language for the Web.

, , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 215-230. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Substructural Meta-Theory of a Type-Safe Language for Web Programming., and . Fundam. Informaticae, 130 (1): 67-97 (2014)A Flexible and Distributed Architecture to Enforce Dynamic Access Control., , and . SEC, volume 201 of IFIP, page 183-195. Springer, (2006)Selecting Appropriate Counter-Measures in an Intrusion Detection Framework., , and . CSFW, page 78-87. IEEE Computer Society, (2004)QWeS2T for Type-Safe Web Programming., and . LAM@LICS, volume 7 of EPiC Series in Computing, page 96-112. EasyChair, (2010)Nomad: A Security Model with Non Atomic Actions and Deadlines., , and . CSFW, page 186-196. IEEE Computer Society, (2005)Controlling Data Flow with a Policy-Based Programming Language for the Web., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 215-230. Springer, (2013)Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework., , , , , and . Ann. des Télécommunications, 61 (1-2): 197-217 (2006)OPA: Onion Policy Administration Model - Another approach to manage rights in DRM., , and . SEC, volume 232 of IFIP, page 349-360. Springer, (2007)FORM : A Federated Rights Expression Model for Open DRM Frameworks., , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 45-59. Springer, (2006)Getting CS undergraduates to communicate effectively., , , , , , and . ITiCSE, page 283-287. ACM, (2011)