Author of the publication

ProFact: A Provenance-Based Analytics Framework for Access Control Policies.

, , , , , , and . IEEE Trans. Serv. Comput., 14 (6): 1914-1928 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysing vulnerability reproducibility for Firefox browser., and . PST, page 674-681. IEEE, (2016)Classification-Based Anomaly Prediction in XACML Policies., and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-19. Springer, (2022)Automatic Conversion of ABAC Policies for RBAC Systems., and . DSC, page 1-7. IEEE, (2023)Methods and Tools for Policy Analysis., , , , , , , and . ACM Comput. Surv., 51 (6): 121:1-121:35 (2019)Reactive Access Control Systems., and . SACMAT, page 205-207. ACM, (2018)Policy Modeling and Anomaly Detection in ABAC Policies., and . CRiSIS, volume 13204 of Lecture Notes in Computer Science, page 137-152. Springer, (2021)Toward More Effective Management of Attribute-Based Access Control Policies. Queen's University at Kingston, Ontario, Canada, (2022)An Automatic Software Vulnerability Classification Framework., , and . ICSSA, page 44-49. IEEE, (2017)Access Control Model Extensions to Support Data Privacy Protection based on GDPR., and . IEEE BigData, page 4017-4024. IEEE, (2019)ProFact: A Provenance-Based Analytics Framework for Access Control Policies., , , , , , and . IEEE Trans. Serv. Comput., 14 (6): 1914-1928 (2021)