Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Role-Based Workflow Models., and . DBSec, volume 215 of IFIP Conference Proceedings, page 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., and . DBSec, volume 113 of IFIP Conference Proceedings, page 166-181. Chapman & Hall, (1997)Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things., and . SACMAT, page 193-204. ACM, (2018)Conceptual Foundations for a Model of Task-based Authorizations., and . CSFW, page 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , and . CSFW, page 159-165. IEEE Computer Society, (1990)Machine Learning in Access Control: A Taxonomy and Survey., , , , , and . CoRR, (2022)Towards a Times-Based Usage Control Model., , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 227-242. Springer, (2007)Stale-safe security properties for group-based secure information sharing., , , and . FMSE, page 53-62. ACM, (2008)Secure Information and Resource Sharing in Cloud Infrastructure as a Service., , and . WISCS@CCS, page 81-90. ACM, (2014)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , and . CODASPY, page 59-70. ACM, (2017)