Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A policy based role framework for access control., , , and . ACM Workshop on Role-Based Access Control, ACM, (1995)Ponder2 - Policy-Based Self Managed Cells., and . AIMS, volume 4543 of Lecture Notes in Computer Science, page 230. Springer, (2007)The Ponder Policy Specification Language., , , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 18-38. Springer, (2001)An Efficient Access Control Model for Mobile Ad-Hoc Communities., and . SPC, volume 3450 of Lecture Notes in Computer Science, page 210-224. Springer, (2005)LTSA-PCA: tool support for compositional reliability analysis., , and . ICSE Companion, page 548-551. ACM, (2014)Organizational cloud security and control: a proactive approach., , , and . Inf. Technol. People, 32 (3): 516-537 (2019)Model-based Self-Adaptive Components: A preliminary approach., and . ICCSW, volume DTR11-9 of Department of Computing Technical Report, page 73-72. Imperial College London, (2011)A Policy Deployment Model for the Ponder Language., , , and . Integrated Network Management, page 529-543. IEEE, (2001)A Policy Language for the Management of Distributed Agents., , , and . AOSE, volume 2222 of Lecture Notes in Computer Science, page 84-100. Springer, (2001)Autonomous Pervasive Systems and the Policy Challenges of a Small World!, , , and . POLICY, page 3-7. IEEE Computer Society, (2007)