Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient integration of fine-grained access control and resource brokering in grid., , , and . The Journal of Supercomputing, 49 (1): 108-126 (2009)Design and implementation of a confidentiality and access control solution for publish/subscribe systems., , and . Computer Networks, 56 (7): 2014-2037 (2012)Towards Run-Time Verification in Access Control., , and . POLICY, page 25-32. IEEE Computer Society, (2011)Enforcing Multi-user Access Policies to Encrypted Cloud Databases., , and . POLICY, page 175-177. IEEE Computer Society, (2011)RelBAC: Relation Based Access Control., , and . SKG, page 3-11. IEEE Computer Society, (2008)Access Control via Lightweight Ontologies., , and . ICSC, page 352-355. IEEE Computer Society, (2011)Providing Confidentiality in Content-based Publish/subscribe Systems., , and . SECRYPT, page 287-292. SciTePress, (2010)MOSES: Supporting and Enforcing Security Profiles on Smartphones., , , , and . IEEE Trans. Dependable Sec. Comput., 11 (3): 211-223 (2014)Floodgate: A Micropayment Incentivized P2P Content Delivery Network., , , and . ICCCN, page 291-297. IEEE, (2008)FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment., , and . IEEE Trans. Information Forensics and Security, 8 (6): 1027-1037 (2013)