Author of the publication

Logic-Based Reasoning on Delegatable Authorizations.

, , and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 185-193. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing and evaluating weighted delegatable authorizations.. Concurr. Comput. Pract. Exp., 27 (15): 3877-3891 (2015)Evaluating Role Based Authorization Programs.. ISMIS, volume 7661 of Lecture Notes in Computer Science, page 202-207. Springer, (2012)Database Research and Development in China., , , and . FODO, page 621-622. Plemum Press, New York, (1985)Logic-Based Reasoning on Delegatable Authorizations., , and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 185-193. Springer, (2002)An Authorization Model for E-consent Requirement in a Health Care Application., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 191-205. Springer, (2003)Access Policy Sheet for Access Control in Fine-Grained XML., , , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1273-1282. Springer, (2005)Decentralized Temporal Authorization Administration., and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 917-926. Springer, (2003)Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems., and . EUC (1), page 90-96. IEEE Computer Society, (2008)Implementing A Framework for Big Data Anonymity and Analytics Access Control., , and . TrustCom/BigDataSE/ICESS, page 873-880. IEEE Computer Society, (2017)Modeling and Robust Control for Trusted Web Server., and . EUC, page 659-665. IEEE Computer Society, (2010)