Author of the publication

The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.

, , and . CSFW, page 148-156. IEEE Computer Society, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Enforcement Model for Group-centric Secure Information Sharing., and . CSE (3), page 189-194. IEEE Computer Society, (2009)Conceptual Foundations for a Model of Task-based Authorizations., and . CSFW, page 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , and . CSFW, page 159-165. IEEE Computer Society, (1990)Expressive power of the single-object typed access matrix model., and . ACSAC, page 184-194. IEEE, (1993)Security Architectures for Controlled Digital Information Dissemination., , and . ACSAC, page 224-. IEEE Computer Society, (2000)Framework for Role-based Delegation Models., and . ACSAC, page 168-. IEEE Computer Society, (2000)Binding Identities and Attributes using Digitally Signed Certificates., and . ACSAC, page 120-127. IEEE Computer Society, (2000)Role-Based Delegation Model/ Hierarchical Roles (RBDM1)., and . ACSAC, page 396-404. IEEE Computer Society, (2004)Enhancing Anonymity via Market Competition., , and . ITCC (1), page 30-34. IEEE Computer Society, (2004)On the minimality of testing for rights in transformation models., and . IEEE Symposium on Security and Privacy, page 230-241. IEEE Computer Society, (1994)