Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Identity Management with Verifiable Credentials and FIDO., , , , , and . IEEE Commun. Stand. Mag., 3 (4): 14-20 (2019)Obligations for Role Based Access Control., , and . AINA Workshops (1), page 424-431. IEEE Computer Society, (2007)Providing secure coordinated access to grid services., , and . MGC@Middleware, page 1. ACM, (2006)Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud., , , , , , , and . CSCloud/EdgeCom, page 74-80. IEEE, (2019)Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time., and . CloudCom, page 792-798. IEEE Computer Society, (2011)Use of Role Based Access Control for Security-Purpose Hypervisors., , and . TrustCom/ISPA/IUCC, page 1613-1619. IEEE Computer Society, (2013)RBAC Policies in XML for X.509 Based Privilege Management., and . SEC, volume 214 of IFIP Conference Proceedings, page 39-54. Kluwer, (2002)Persistent versus Dynamic Role Membership., , , and . DBSec, volume 142 of IFIP, page 344-357. Kluwer/Springer, (2003)The PERMIS X.509 role based privilege management infrastructure., and . SACMAT, page 135-140. ACM, (2002)Understanding X.500 - the directory.. Chapman and Hall, (1994)