Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lazouski, Aliaksandr
add a person with the name Lazouski, Aliaksandr
 

Other publications of authors with the same name

Usage control in cloud systems., , , and . ICITST, page 202-207. IEEE, (2012)Influence of Attribute Freshness on Decision Making in Usage Control., , , and . STM, volume 6710 of Lecture Notes in Computer Science, page 35-50. Springer, (2010)Usage Control, Risk and Trust., , , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Usage Control on Cloud systems., , , , and . Future Generation Comp. Syst., (2016)Security-by-Contract-with-Trust for Mobile Devices., , , , , , , and . JoWUA, 1 (4): 75-91 (2010)Towards Policy Engineering for Attribute-Based Access Control., , , and . INTRUST, volume 8292 of Lecture Notes in Computer Science, page 85-102. Springer, (2013)A Prototype for Enforcing Usage Control Policies Based on XACML., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 79-92. Springer, (2012)Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties., , , and . IEEE Systems Journal, 7 (2): 223-235 (2013)A Proposal on Enhancing XACML with Continuous Usage Control Features., , , and . CoreGRID@Euro-Par, page 133-146. Springer, (2009)On Usage Control for GRID Services., , , and . CSO (1), page 47-51. IEEE Computer Society, (2009)