Author of the publication

A Proposal on Enhancing XACML with Continuous Usage Control Features.

, , , and . CoreGRID@Euro-Par, page 133-146. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud., , , and . IEEE Symposium on Security and Privacy Workshops, page 23-30. IEEE Computer Society, (2014)A Prototype for Enforcing Usage Control Policies Based on XACML., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 79-92. Springer, (2012)Access and Usage Control in Grid.. University of Pisa, Italy, (2011)Towards Policy Engineering for Attribute-Based Access Control., , , and . INTRUST, volume 8292 of Lecture Notes in Computer Science, page 85-102. Springer, (2013)Usage control in cloud systems., , , and . ICITST, page 202-207. IEEE, (2012)Usage Control, Risk and Trust., , , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Influence of Attribute Freshness on Decision Making in Usage Control., , , and . STM, volume 6710 of Lecture Notes in Computer Science, page 35-50. Springer, (2010)On Usage Control for GRID Services., , , and . CSO (1), page 47-51. IEEE Computer Society, (2009)Extending Security-by-Contract with Quantitative Trust on Mobile Devices., , , , , and . CISIS, page 872-877. IEEE Computer Society, (2010)Towards Attribute-Based Access Control Policy Engineering Using Risk., , , and . RISK@ICTSS, volume 8418 of Lecture Notes in Computer Science, page 80-90. Springer, (2013)