Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML-Based Distributed Access Control System., , and . EC-Web, volume 2455 of Lecture Notes in Computer Science, page 203-213. Springer, (2002)Integrity Issues in the Web: Beyond Distributed Databases., , and . Database Integrity, Idea Group, (2002)Querying the Web with Datalog., and . IADT, page 499-504. (1998)The digital information war.. Online Information Review, 31 (1): 5-9 (2007)Recuperación de Información en la WWW: D3Web., and . JIDBD, page 31-40. Universidad Carlos III de Madrid, (1997)A metadata-based access control model for web services., , and . Internet Research, 15 (1): 99-116 (2005)Access Control Infrastructure for Digital Objects., , , , and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 399-410. Springer, (2002)Secure Content Distribution for Digital Libraries., , , , and . ICADL, volume 2555 of Lecture Notes in Computer Science, page 483-494. Springer, (2002)A Semantic Approach for Access Control in Web Services., and . EuroWeb, BCS, (2002)Semantic Access Control Model: A Formal Specification., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 24-43. Springer, (2005)