Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Framework for Enforcing Multiple Access Control Policies., , , and . SIGMOD Conference, page 474-485. ACM Press, (1997)Threat Modeling for Cloud Data Center Infrastructures., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 302-319. Springer, (2016)Distributed Query Evaluation over Encrypted Data., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 96-114. Springer, (2021)Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , and . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , and . VLDB, page 123-134. ACM, (2007)Regulating Exceptions in Healthcare Using Policy Spaces., , , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 254-267. Springer, (2008)Cooperative Data Access in Multi-cloud Environments., , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 14-28. Springer, (2011)Data Mining for Intrusion Detection., and . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Assessing query privileges via safe and efficient permission composition., , , , and . ACM Conference on Computer and Communications Security, page 311-322. ACM, (2008)MTD 2014: First ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 1550-1551. ACM, (2014)