Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On usage control for GRID systems., and . Future Generation Comp. Syst., 26 (7): 1032-1042 (2010)Towards Continuous Usage Control on Grid Computational Services., , and . ICAS/ICNS, page 82. IEEE Computer Society, (2005)A model for usage control in GRID systems., and . SecureComm, page 169-175. IEEE, (2007)Usage Control on Cloud systems., , , , and . Future Generation Comp. Syst., (2016)Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)A Prototype for Enforcing Usage Control Policies Based on XACML., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 79-92. Springer, (2012)My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data., , , , , and . APF, volume 8450 of Lecture Notes in Computer Science, page 154-171. Springer, (2014)Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers., , , , and . ARES, page 296-303. IEEE Computer Society, (2016)Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain., , and . PVM/MPI, volume 2131 of Lecture Notes in Computer Science, page 304-311. Springer, (2001)Enforcement of U-XACML History-Based Usage Control Policy., , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 64-81. Springer, (2016)