Author of the publication

Security Analysis of Role-Based Access Control through Program Verification.

, , and . CSF, page 113-125. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic key assignment schemes for any access control policy., , and . Inf. Process. Lett., 92 (4): 199-205 (2004)Efficient provably-secure hierarchical key assignment schemes., , and . Theor. Comput. Sci., 412 (41): 5684-5699 (2011)New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes., , and . IACR Cryptology ePrint Archive, (2006)Efficient Provably-Secure Hierarchical Key Assignment Schemes., , and . IACR Cryptology ePrint Archive, (2006)Vac - Verifier of Administrative Role-Based Access Control Policies., , , and . CAV, volume 8559 of Lecture Notes in Computer Science, page 184-191. Springer, (2014)Policy Analysis for Self-administrated Role-Based Access Control., , and . TACAS, volume 7795 of Lecture Notes in Computer Science, page 432-447. Springer, (2013)Analyzing temporal role based access control models., , , , , , and . SACMAT, page 177-186. ACM, (2012)Variations on a theme by Akl and Taylor: Security and tradeoffs., , , and . Theor. Comput. Sci., 411 (1): 213-227 (2010)Security Analysis of Role-Based Access Control through Program Verification., , and . CSF, page 113-125. IEEE Computer Society, (2012)Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems., , , and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 349-361. Springer, (2017)