Author of the publication

Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.

, , and . MIST@CCS, page 13-22. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Policy Management for Handheld Devices., , , , and . Security and Management, page 199-204. CSREA Press, (2003)Proximity-Based Authentication for Mobile Devices., , and . Security and Management, page 398-404. CSREA Press, (2005)Composing and combining policies under the policy machine., , , and . SACMAT, page 11-20. ACM, (2005)Administering Access Control in Dynamic Coalitions., , , , and . LISA, page 249-261. USENIX, (2005)Smart Card Authentication for Mobile Devices., , and . AISM, page 38-46. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Application-Oriented Security Policies and Their Composition (Position Paper)., and . Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, page 67-74. Springer, (1998)Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems., , and . MIST@CCS, page 13-22. ACM, (2016)Imposing Fine-grain Next Generation Access Control over Database Queries., , , and . ABAC@CODASPY, page 9-15. ACM, (2017)Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8 (1): 4-25 (2017)On the Formal Definition of Separation-of-Duty Policies and their Composition., , and . S&P, page 172-183. IEEE Computer Society, (1998)