Author of the publication

Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs.

, and . ICCS, volume 4068 of Lecture Notes in Computer Science, page 427-440. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disclosure detection over data streams in database publishing., and . EDBT/ICDT Ph.D. Workshop, page 8-13. ACM, (2011)Piece Resolution: Towards Larger Perspectives., and . ICCS, volume 1453 of Lecture Notes in Computer Science, page 179-193. Springer, (1998)Un modèle de représentation et d'analyse des systèmes multi-agents., , and . JFIADSMA, page 81-92. Hermès Lavoisier Editions, (1999)Integration of Access Control in Information Systems: From Role Engineering to Implementation., and . Informatica (Slovenia), 30 (1): 87-95 (2006)Towards a New Role Paradigm for Object-Oriented Modeling., and . OOIS Workshops, volume 2426 of Lecture Notes in Computer Science, page 44-52. Springer, (2002)Modèle à rôles pour objets variables persistants., and . BDA, (2000)Semi structuré + structuré = structuré?. INFORSID, page 315-330. (1999)Detecting Privacy Violations in Multiple Views Publishing., and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 506-513. Springer, (2012)Meta-data Resolution for Document Retrieval., , and . MD, IEEE Computer Society, (1999)A relational database integrity framework for access control policies., and . J. Intell. Inf. Syst., 38 (1): 131-159 (2012)