Author of the publication

Panel: The next generation of acess control models (panel session): do we need them and what should they be?

, , , , and . SACMAT, page 53. ACM, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of stealthy TCP-based DoS attacks., , , , , , , and . MILCOM, page 348-353. IEEE, (2015)Flexible security configuration for virtual machines., , and . CSAW, page 35-44. ACM, (2008)Seeding clouds with trust anchors., , , , and . CCSW, page 43-46. ACM, (2010)Impact of Emerging Hardware on Security and Privacy., , , and . IEEE Secur. Priv., 21 (3): 6-7 (May 2023)Enforcing Multilevel Security Policies in Unstable Networks., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2349-2365 (2022)Network-Based Root of Trust for Installation., , , and . IEEE Secur. Priv., 9 (1): 40-48 (2011)PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems., , , , , , , , and . CoRR, (2020)Agility maneuvers to mitigate inference attacks on sensed location data., , , and . MILCOM, page 259-264. IEEE, (2016)An architecture for enforcing end-to-end access control over web applications., , , , , , , and . SACMAT, page 163-172. ACM, (2010)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)