Author of the publication

Specification and enforcement of flexible security policy for active cooperation.

, , , , and . Inf. Sci., 179 (15): 2629-2642 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Key Management in Dynamic Wireless Sensor Networks., , , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 371-383 (2015)IdentiDroid: Android can finally Wear its Anonymous Suit., , , and . Trans. Data Priv., 7 (1): 27-50 (2014)Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., and . Trans. Data Priv., 2 (1): 1-2 (2009)Detecting mobile malware threats to homeland security through static analysis., , , , and . J. Netw. Comput. Appl., (2014)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)Hiding Association Rules by Using Confidence and Support., , , and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 369-383. Springer, (2001)Crypto-Chain: A Relay Resilience Framework for Smart Vehicles., , , and . ACSAC, page 439-454. ACM, (2021)Self-tuning query mesh for adaptive multi-route query processing., , and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 803-814. ACM, (2009)Detection of Temporal Insider Threats to Relational Databases., and . CIC, page 406-415. IEEE Computer Society, (2017)Detection of Temporal Data Ex-Filtration Threats to Relational Databases., and . CIC, page 146-155. IEEE Computer Society, (2018)