Author of the publication

Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array.

, , , , , and . ICST Workshops, page 251-259. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)Security or Privacy: Can You Have Both?, , and . Computer, 53 (9): 20-30 (2020)Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing., , , and . Math. Comput. Sci., 15 (4): 741 (2021)A Combinatorial Approach to Explaining Image Classifiers., , , and . ICST Workshops, page 35-43. IEEE, (2021)Combinatorially XSSing Web Application Firewalls., , , , , and . ICST Workshops, page 85-94. IEEE, (2021)Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions., , , , and . ICST Workshops, page 110-117. IEEE, (2022)Implementing and Managing Policy Rules in Attribute Based Access Control., , , , and . IRI, page 518-525. IEEE Computer Society, (2015)Fault localization based on failure-inducing combinations., , , , and . ISSRE, page 168-177. IEEE Computer Society, (2013)The Computational Complexity of Enforceability Validation for Generic Access Control Rules., , and . SUTC (1), page 260-267. IEEE Computer Society, (2006)