Author of the publication

Request-driven role mapping framework for secure interoperation in multi-domain environments.

, , , and . Comput. Syst. Sci. Eng., (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inconsistency resolving of safety and utility in access control., , , and . EURASIP J. Wireless Comm. and Networking, (2011)On Role Mappings for RBAC-Based Secure Interoperation., , and . NSS, page 270-277. IEEE Computer Society, (2009)Role updating for assignments., , , and . SACMAT, page 89-98. ACM, (2010)Towards Accelerated Usage Control Based on Access Correlations., , , and . NordSec, volume 10674 of Lecture Notes in Computer Science, page 245-261. Springer, (2017)Safety and Availability Checking for User Authorization Queries in RBAC., , , and . Int. J. Comput. Intell. Syst., 5 (5): 860-867 (2012)Enforcing Usage Constraints on Credentials for Web Applications., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 112-125. Springer, (2015)Constraint-enhanced role engineering via answer set programming., , , and . AsiaCCS, page 73-74. ACM, (2012)Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models., , , and . IEICE Transactions, 95-B (5): 1508-1518 (2012)RBAC-Based Secure Interoperation Using Constraint Logic Programming., , and . CSE (2), page 867-872. IEEE Computer Society, (2009)RAR: A role-and-risk based flexible framework for secure collaboration., , , , and . Future Generation Comp. Syst., 27 (5): 574-586 (2011)