Author of the publication

An Extended Role-Based Access Control Model for Delegating Obligations.

, , , and . TrustBus, volume 5695 of Lecture Notes in Computer Science, page 127-137. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPIKE: A System for Automatic Inductive Proofs., and . AMAST, volume 936 of Lecture Notes in Computer Science, page 576-577. Springer, (1995)Optimization of parallel firewalls filtering rules., , , and . Int. J. Inf. Sec., 21 (2): 323-340 (2022)Incremental One-Class Models for Data Classification., , , and . CoRR, (2016)A Novel Multispectral Lab-depth based Edge Detector for Color Images with Occluded Objects., , , and . VISIGRAPP (4: VISAPP), page 272-279. SciTePress, (2019)A Domain Specific Language for Securing Distributed Systems., , and . ICSNC, page 76. IEEE Computer Society, (2007)Poster : Minimizing range rules for packet filtering using a double mask representation., , , , and . Networking, page 1-2. IEEE, (2019)Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules., and . ISCC, page 63-70. IEEE Computer Society, (2007)A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations., and . CNSM, page 1-5. IEEE, (2020)Dynamic Scheme for Packet Classification Using Splay Trees., and . CISIS, volume 53 of Advances in Soft Computing, page 211-218. Springer, (2008)Advanced analysis of the integrity of access control policies: the specific case of databases., , and . Int. Arab J. Inf. Technol., 17 (5): 808-815 (2020)