Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid., and . ACM Conference on Computer and Communications Security, page 1391-1402. ACM, (2014)Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies., , , , and . ACM Trans. Inf. Syst. Secur., 15 (4): 18:1-18:28 (2013)An authorization scheme for version control systems., , and . SACMAT, page 123-132. ACM, (2011)Efficient access enforcement in distributed role-based access control (RBAC) deployments., and . SACMAT, page 155-164. ACM, (2009)Access control in practice: pain points., , , , and . SACMAT, page 75-76. ACM, (2010)Security analysis in role-based access control., and . SACMAT, page 126-135. ACM, (2004)Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies., , and . SACMAT, page 15-26. ACM, (2015)The Foundational Work of Harrison-Ruzzo-Ullman Revisited., and . IEEE Trans. Dependable Secur. Comput., 10 (1): 28-39 (2013)Connectivity provisioning with security attributes., and . Softw. Focus, 2 (3): 112-116 (2001)Relating declarative semantics and usability in access control., , , and . SOUPS, page 14. ACM, (2012)