Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Mapping Specification with Exemplar Tuples., , , and . SIGMOD Conference, page 667-682. ACM, (2017)Integration of Access Control in Information Systems: From Role Engineering to Implementation., and . Informatica (Slovenia), 30 (1): 87-95 (2006)Découverte automatisée de hiérarchies de rôles pour les politiques de contrôle d'accès.. INFORSID, page 139-154. (2007)Tuple-based access control: a provenance-based information flow control for relational data., , and . SAC, page 2165-2170. ACM, (2015)Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 914-923. Springer, (2006)Refactoring multi-layered access control policies through (De)composition., and . CNSM, page 243-250. IEEE Computer Society, (2013)A relational database integrity framework for access control policies., and . J. Intell. Inf. Syst., 38 (1): 131-159 (2012)Un Modèle Homogène pour la Confidentialité et l'Intégrité des Données Relationnelles., and . BDA, (2006)RDF Graph Anonymization Robust to Data Linkage., , , and . WISE, volume 11881 of Lecture Notes in Computer Science, page 491-506. Springer, (2019)Access Control Configuration for J2EE Web Applications: A Formal Perspective., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 30-35. Springer, (2012)