Author of the publication

Checking Causal Consistency of Distributed Databases.

, , , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 35-51. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

curlX: A middleware to enforce access control policies within a cloud environment., , and . CNS, page 771-772. IEEE, (2015)A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation., , , and . ISCRAM-med, volume 196 of Lecture Notes in Business Information Processing, page 112-119. Springer, (2014)Analysis and Verification of XACML Policies in a Medical Cloud Environment., , , and . Scalable Computing: Practice and Experience, 17 (3): 189-206 (2016)Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis., , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 250-266. Springer, (2019)Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies., , , and . ICST Trans. Security Safety, 5 (16): e3 (2018)Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments., , , and . CCSW, page 55-59. ACM, (2016)Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines., , and . CommNet, page 1-10. IEEE, (2019)Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach., , , and . BigData, page 5330-5332. IEEE, (2018)Access control policies enforcement in a cloud environment: Openstack., , and . IAS, page 26-31. IEEE, (2015)Access control in a collaborative session in multi tenant environment., , and . IAS, page 129-134. IEEE, (2015)