Author of the publication

Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs.

, and . ICCS, volume 4068 of Lecture Notes in Computer Science, page 427-440. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Mapping Specification with Exemplar Tuples., , , and . SIGMOD Conference, page 667-682. ACM, (2017)Integration of Access Control in Information Systems: From Role Engineering to Implementation., and . Informatica (Slovenia), 30 (1): 87-95 (2006)Découverte automatisée de hiérarchies de rôles pour les politiques de contrôle d'accès.. INFORSID, page 139-154. (2007)Tuple-based access control: a provenance-based information flow control for relational data., , and . SAC, page 2165-2170. ACM, (2015)Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 914-923. Springer, (2006)Refactoring multi-layered access control policies through (De)composition., and . CNSM, page 243-250. IEEE Computer Society, (2013)Query-Based Linked Data Anonymization., , , and . ISWC (1), volume 11136 of Lecture Notes in Computer Science, page 530-546. Springer, (2018)UPnQ: An Architecture for Personal Information Exploration., , , , and . DEXA (1), volume 8644 of Lecture Notes in Computer Science, page 257-264. Springer, (2014)Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings., , , , and . ARES, page 140-145. IEEE Computer Society, (2014)Detection of Conflicting Compliance Rules., , and . EDOCW, page 419-428. IEEE Computer Society, (2011)