Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model for usage control in GRID systems., and . SecureComm, page 169-175. IEEE, (2007)Towards Continuous Usage Control on Grid Computational Services., , and . ICAS/ICNS, page 82. IEEE Computer Society, (2005)Usage Control on Cloud systems., , , , and . Future Generation Comp. Syst., (2016)Enforcement of U-XACML History-Based Usage Control Policy., , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 64-81. Springer, (2016)Managing QoS in Smart Buildings Through Software Defined Network and Usage Control., , , and . PerCom Workshops, page 626-632. IEEE, (2019)Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 237-251. (2017)Implementing Usage Control in Internet of Things: A Smart Home Use Case., , , and . TrustCom/BigDataSE/ICESS, page 1056-1063. IEEE Computer Society, (2017)Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things., , , , and . TrustCom/BigDataSE, page 1844-1851. IEEE, (2018)Enhancing Usage Control for Performance: An Architecture for Systems of Systems., , , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 69-84. Springer, (2018)Introducing Usage Control in MQTT., , , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 35-43. Springer, (2017)