Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Negotiation as an Authorization Service forWeb Services., , , , , and . ICDE Workshops, page 21. IEEE Computer Society, (2006)A formal framework for reflective database access control policies., , and . ACM Conference on Computer and Communications Security, page 289-298. ACM, (2008)Defeasible security policy composition for web services., , , and . FMSE, page 45-54. ACM, (2006)Implementing Reflective Access Control in SQL., , , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 17-32. Springer, (2009)Harvesting credentials in trust negotiation as an honest-but-curious adversary., , and . WPES, page 64-67. ACM, (2007)Pools of virtual boxes: building campus grids with virtual machines., , and . HPDC, page 667-675. ACM, (2010)Improving multi-tier security using redundant authentication., , , , , and . CSAW, page 54-62. ACM, (2007)Reflective Database Access Control. University of Illinois Urbana-Champaign, USA, (2009)Microfocal X-ray computed tomography post-processing operations for optimizing reconstruction volumes of stented arteries during 3D computational fluid dynamics modeling., , , , , , , and . Comput. Methods Programs Biomed., 79 (2): 121-134 (2005)