Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Policy Based Management Architecture for Large Scale Active Communication Systems., and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 202-213. Springer, (2001)A XML based Policy-Driven Management Information Service., , and . Integrated Network Management, page 277-280. IEEE, (2001)Policy-based Management for ALAN-Enabled Networks., , , , , , , and . POLICY, page 181-192. IEEE Computer Society, (2002)A Policy Based Approach for Automated Topology Management of Peer To Peer Networks and a Prototype Implementation., , and . POLICY, page 235-238. IEEE Computer Society, (2003)The Increasing Role of Service Level Agreements in B2B Systems., , and . WEBIST (2), page 123-126. INSTICC Press, (2006)Behavioral Specification Using XML., and . FTDCS, page 53-59. IEEE Computer Society, (1999)ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code., , , , , , , , and . EuroSys, page 4:1-4:15. ACM, (2019)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts., , , , , , , , , and 1 other author(s). RAID, page 296-311. ACM, (2021)CUP: Comprehensive User-Space Protection for C/C++., , , and . AsiaCCS, page 381-392. ACM, (2018)