Author of the publication

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.

, , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8 (1): 4-25 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8 (1): 4-25 (2017)A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems., , , , and . CoRR, (2019)Some properties of k-trees., and . Discret. Math., 310 (17-18): 2415-2425 (2010)Measuring and Improving the Effectiveness of Defense-in-Depth Postures., , and . ICSS, page 15-22. ACM, (2016)Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems., , and . MIST@CCS, page 13-22. ACM, (2016)A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement., , and . IACR Cryptology ePrint Archive, (2019)Maximally edge-connected realizations and Kundu's k $k$ -factor theorem.. J. Graph Theory, 105 (1): 83-97 (January 2024)Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness., , and . CoRR, (2019)Extremal Theorems for Degree Sequence Packing and the Two-Color Discrete Tomography Problem., , , and . SIAM J. Discret. Math., 29 (4): 2088-2099 (2015)Smart Contract Federated Identity Management without Third Party Authentication Services., , and . Open Identity Summit, volume P-293 of LNI, page 37-48. GI, (2019)