Author of the publication

Policy-based access control for constrained healthcare resources in the context of the Internet of Things.

, , , and . J. Netw. Comput. Appl., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Categorical Information Flow., , , and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 329-343. Springer, (2019)Policy-Based Access Control for Constrained Healthcare Resources., , , and . WOWMOM, page 588-599. IEEE Computer Society, (2018)Abstract Hidden Markov Models: a monadic account of quantitative information flow., , and . CoRR, (2017)Schedulers and Finishers: On Generating the Behaviours of an Event Structure., , and . ICTAC, volume 9965 of Lecture Notes in Computer Science, page 121-138. (2016)Policy-based access control for constrained healthcare resources in the context of the Internet of Things., , , and . J. Netw. Comput. Appl., (2019)Reasoning About Distributed Secrets., , , and . FORTE, volume 10321 of Lecture Notes in Computer Science, page 156-170. Springer, (2017)Abstract Hidden Markov Models: A Monadic Account of Quantitative Information Flow., , and . LICS, page 597-608. IEEE Computer Society, (2015)VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions., , , and . ICCCN, page 1-7. IEEE, (2022)On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems., , , and . MobiQuitous, page 432-441. ACM, (2017)An Event Structure Model for Probabilistic Concurrent Kleene Algebra., , and . LPAR, volume 8312 of Lecture Notes in Computer Science, page 653-667. Springer, (2013)