Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sophisticated Access Control via SMT and Logical Frameworks., , and . ACM Trans. Inf. Syst. Secur., 16 (4): 17 (2014)Automated Policy Analysis., , , , and . POLICY, page 1-8. IEEE Computer Society, (2012)QAM: A comprehensive QoS-aware Middleware suite for tactical communications., , , , , , , and . MILCOM, page 1586-1591. IEEE, (2011)Using an adaptive management plane for policy-based network management traffic in MANETs., , , , , and . MILCOM, page 1133-1138. IEEE, (2011)Modular natural language interfaces to logic-based policy frameworks., , , , , and . Comput. Stand. Interfaces, 35 (5): 417-427 (2013)Policy-based spectrum management architecture., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)Testing android devices for tactical networks: A hybrid emulation testbed approach., , , , , and . MILCOM, page 489-494. IEEE, (2015)ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System., , , , , and . CLOSER, page 191-200. SciTePress, (2017)On the Feasibility of Deploying Software Attestation in Cloud Environments., , , , , and . IEEE CLOUD, page 128-135. IEEE Computer Society, (2014)A GNU-based packet radio for network management field testing., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)