Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Role-Based Workflow Models., and . DBSec, volume 215 of IFIP Conference Proceedings, page 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., and . DBSec, volume 113 of IFIP Conference Proceedings, page 166-181. Chapman & Hall, (1997)A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service., , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 41-53. Springer, (2014)Adopting Provenance-Based Access Control in OpenStack Cloud IaaS., , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 15-27. Springer, (2014)The GURA_G GURA G Administrative Model for User and Group Attribute Assignment., and . NSS, volume 9955 of Lecture Notes in Computer Science, page 318-332. Springer, (2016)An Attribute-Based Protection Model for JSON Documents., , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 303-317. Springer, (2016)DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things., , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 278-290. Springer, (2021)Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy., , and . ABAC@CODASPY, page 1-12. ACM, (2016)Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars., , , and . CODASPY, page 61-72. ACM, (2019)Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems., , , and . CODASPY, page 283-285. ACM, (2023)