Author of the publication

Towards Secure Virtual Directories: A Risk Analysis Framework.

, and . COMPSAC, page 27-36. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information., and . WOSIS, page 36-45. INSTICC Press, (2009)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Detecting insider activity using enhanced directory virtualization., and . Insider Threats@CCS, page 29-36. ACM, (2010)Ensuring information assurance in federated identity management., , and . IPCCC, page 821-826. IEEE, (2004)Similarity analysis of shellcodes in drive-by download attack kits., , and . CollaborateCom, page 687-694. ICST / IEEE, (2012)Permission Management System: Permission as a Service in Cloud Computing., , and . COMPSAC Workshops, page 371-375. IEEE Computer Society, (2010)Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks., and . SmartNets, page 1-8. IEEE, (2023)A Mapping Study on Privacy Attacks in Big Data and IoT., , and . ICTC, page 1158-1163. IEEE, (2022)Role-Based Privilege Management Using Attribute Certificates and Delegation., , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 100-109. Springer, (2004)A role-based infrastructure management system: design and implementation., , , and . Concurr. Pract. Exp., 16 (11): 1121-1141 (2004)