Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing spatial constraints for mobile RBAC systems., and . SACMAT, page 99-108. ACM, (2010)A formal proximity model for RBAC systems., , and . Comput. Secur., (2014)Evaluating an Alternative CS1 for Students with Prior Programming Experience., and . SIGCSE, page 333-338. ACM, (2017)A selective encryption approach to fine-grained access control for P2P file sharing., , , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)Location-Aware Authentication and Access Control., and . AINA, page 10-15. IEEE Computer Society, (2009)PEAR: a hardware based protocol authentication system., , and . SPRINGL, page 18-25. ACM, (2010)Automating Systems Course Unit and Integration Testing: Experience Report, , and . Proceedings of the 50th ACM Technical Symposium on Computer Science Education, page 565--570. New York, NY, USA, ACM, (2019)A secure architecture design based on application isolation, code minimization and randomization., , and . CNS, page 423-429. IEEE, (2013)Marlin: Mitigating Code Reuse Attacks Using Code Randomization., , , and . IEEE Trans. Dependable Secur. Comput., 12 (3): 326-337 (2015)Resilient Authenticated Execution of Critical Applications in Untrusted Environments., , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 597-609 (2012)