Author of the publication

Application-Level Isolation Using Data Inconsistency Detection.

, , and . ACSAC, page 119-126. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Going Beyond MAC and DAC Using Mobile Policies., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 245-260. Kluwer, (2001)Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications., , , and . ACSAC, page 298-307. IEEE Computer Society, (2000)Consistent policy enforcement in distributed systems using mobile policies., , , and . Data Knowl. Eng., 43 (3): 261-280 (2002)Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?., , , and . IICIS, volume 211 of IFIP Conference Proceedings, page 77-94. Kluwer, (2001)Application-Level Isolation Using Data Inconsistency Detection., , and . ACSAC, page 119-126. IEEE Computer Society, (1999)A User Friendly Guard with Mobile Post-Release Access Control Policy., , , and . SEC, volume 250 of IFIP Conference Proceedings, page 265-276. Kluwer, (2003)Propagating Modifications to Mobile Policies., , , and . SEC, volume 214 of IFIP Conference Proceedings, page 573-584. Kluwer, (2002)