Author of the publication

Security policy verification for multi-domains in cloud systems.

, , and . Int. J. Inf. Sec., 13 (2): 97-111 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing and Managing Policy Rules in Attribute Based Access Control., , , , and . IRI, page 518-525. IEEE, (2015)Policy Mediation for Multi-Enterprise Environments., , , , , and . ACSAC, page 100-106. IEEE Computer Society, (2000)The Computational Complexity of Enforceability Validation for Generic Access Control Rules., , and . SUTC (1), page 260-267. IEEE Computer Society, (2006)Specification of attribute relations for access control policies and constraints using Policy Machine., , and . IAS, page 32-35. IEEE, (2010)The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit., and . SocialCom, page 494-501. IEEE Computer Society, (2013)Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems., , and . SERE (Companion), page 35-44. IEEE, (2013)Detection of Multiple-Duty-Related Security Leakage in Access Control Policies., , and . SSIRI, page 65-74. IEEE Computer Society, (2009)Paradigm in Verification of Access Control., , and . SERE (Companion), page 193. IEEE, (2012)Access Control Policy Verification., and . IEEE Computer, 49 (12): 80-83 (2016)