Author of the publication

Interoperable Access Control by Means of a Semantic Approach.

, , and . AINA Workshops, page 280-285. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cloud-based architecture for emergency management and first responders localization in smart city environments., , , and . Comput. Electr. Eng., (2016)GRASP-based resource re-optimization for effective big data access in federated clouds., , , and . Future Gener. Comput. Syst., (2016)Distributed Group Key Management for Event Notification Confidentiality Among Sensors., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 566-580 (2020)DELEX: a DEep Learning Emotive eXperience: Investigating empathic HCI., , , and . AVI, page 14:1-14:8. ACM, (2020)Steganography and Secure Communication on Online Social Networks and Online Photo Sharing., , and . BWCCA, page 363-368. IEEE Computer Society, (2011)A Novel Anti-forensics Technique for the Android OS., , , and . BWCCA, page 380-385. IEEE Computer Society, (2011)A Forensic Analysis of Images on Online Social Networks., , and . INCoS, page 679-684. IEEE Computer Society, (2011)On the Construction of a False Digital Alibi on the Android OS., , , , and . INCoS, page 685-690. IEEE Computer Society, (2011)An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications., , , , and . INCoS, page 157-165. IEEE, (2013)Selection-Based Scheduling Algorithms under Service Level Agreement Constraints., , , and . CSCS, page 134-140. IEEE, (2017)