Author of the publication

A Distributed Usage Control Framework for Industrial Internet of Things.

, , , and . Security and Privacy Trends in the Industrial Internet of Thing, Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting If This Then That and Usage Control obligations for Smart Home security and management., , , , , and . Concurr. Comput. Pract. Exp., (2022)Privacy preserving data sharing and analysis for edge-based architectures., , , and . Int. J. Inf. Sec., 21 (1): 79-101 (2022)MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)Cybsersecurity Issues in Robotics., , , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (3): 1-28 (2021)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices., , , and . Soft Comput., 25 (3): 2295-2314 (2021)A Comparison Among Policy Editors for Attributed Based Access Control Model., , , , , and . ETAA@ESORICS, volume 12515 of Lecture Notes in Computer Science, page 108-123. Springer, (2020)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , and . STM, volume 10547 of Lecture Notes in Computer Science, page 118-133. Springer, (2017)CANDY: A Social Engineering Attack to Leak Information from Infotainment System., , , and . VTC Spring, page 1-5. IEEE, (2018)Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control., , , , , , , and . IEEE Communications Magazine, 58 (7): 65-71 (2020)