Author of the publication

On the Complexity of Authorization in RBAC under Qualification and Security Constraints.

, , , , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 883-897 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Summary Risk Scores for Mobile Applications., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 238-251 (2014)Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management., , and . S&P, page 123-139. IEEE Computer Society, (2003)Safety in Automated Trust Negotiation., and . S&P, page 147-160. IEEE Computer Society, (2004)Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages., , , and . Hum. Factors, (2019)Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?, , , and . Hum. Factors, 59 (4): 640-660 (2017)OACerts: Oblivious Attribute Certificates., and . IEEE Trans. Dependable Secur. Comput., 3 (4): 340-352 (2006)Four accuracy bounds and one estimator for frequency estimation under local differential privacy., , , and . CoRR, (2019)A Critique of the ANSI Standard on Role-Based Access Control., , and . IEEE Secur. Priv., 5 (6): 41-49 (2007)Federation in genomics pipelines: techniques and challenges., , , , , and . Briefings Bioinform., 20 (1): 235-244 (2019)