Author of the publication

A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences.

, , and . SACMAT, page 195-206. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications., , and . AsiaCCS, page 829-840. ACM, (2016)Pluggable verification modules: an extensible protection mechanism for the JVM.. OOPSLA, page 404-418. ACM, (2004)Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model., and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 109-126. Springer, (2012)Discretionary Capability Confinement.. ESORICS, volume 4189 of Lecture Notes in Computer Science, page 127-144. Springer, (2006)Design Patterns for Multiple Stakeholders in Social Computing., and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 163-178. Springer, (2014)Techniques for Trusted Software Engineering., , and . ICSE, page 126-135. IEEE Computer Society, (1998)A Module System for Isolating Untrusted Software Extensions., and . ACSAC, page 203-212. IEEE Computer Society, (2006)Inference attacks by third-party extensions to social network systems., , and . PerCom Workshops, page 282-287. IEEE Computer Society, (2011)Link-Time Enforcement of Confined Types for JVM Bytecode.. PST, (2005)On protection in federated social computing systems., , and . CODASPY, page 75-86. ACM, (2014)