Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Management.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)On Safety in Discretionary Access Control., and . IEEE Symposium on Security and Privacy, page 96-109. IEEE Computer Society, (2005)A Practically Implementable and Tractable Delegation Logic., , and . IEEE Symposium on Security and Privacy, page 27-42. IEEE Computer Society, (2000)Securing Java RMI-Based Distributed Applications., , and . ACSAC, page 262-271. IEEE Computer Society, (2004)Policy framework for security and privacy management., , , , , , , , , and 1 other author(s). IBM Journal of Research and Development, 53 (2): 4 (2009)Denial of service attacks and defenses in decentralized trust management., , , and . Int. J. Inf. Sec., 8 (2): 89-101 (2009)The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context., , , , and . Int. J. Hum.-Comput. Stud., (2018)Homomorphic Encryption.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy., , , , and . ACM Conference on Computer and Communications Security, page 212-229. ACM, (2018)OACerts: Oblivious Attribute Certificates., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 301-317. (2005)