Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compile-Time and Runtime Analysis of Active Behaviors., , and . IEEE Trans. Knowl. Data Eng., 10 (3): 353-370 (1998)A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks., , and . Computer Networks, (2015)Securing SOAP e-services., , , and . Int. J. Inf. Sec., 1 (2): 100-115 (2002)Debugging and Run-time Monitoring of Active Rules., , and . Journal of Systems Integration, 7 (3/4): 327-347 (1997)DockerPolicyModules: Mandatory Access Control for Docker containers., , , and . CNS, page 749-750. IEEE, (2015)Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems., , , , , and . EUSFLAT Conf., page 43-48. University of Applied Sciences at Zittau/Görlitz, Germany, (2003)Open Source Contributions., , , , , , , , and . Privacy and Identity Management for Life, Springer, (2011)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , and . VLDB, page 123-134. ACM, (2007)Improving Android security by widening the role of Mandatory Access Control., , , and . TinyToCS, (2016)Shuffle Index: Efficient and Private Access to Outsourced Data., , , , and . TOS, 11 (4): 19:1-19:55 (2015)