Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deductive Databases.. PADL, volume 1990 of Lecture Notes in Computer Science, page 123-137. Springer, (2001)Secommunity: A Framework for Distributed Access Control., and . LPNMR, volume 6645 of Lecture Notes in Computer Science, page 297-303. Springer, (2011)Socially Constructed Trust for Distributed Authorization., and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 262-277. Springer, (2011)RBAC Policy Implementation for SQL Databases., and . DBSec, volume 142 of IFIP, page 288-301. Kluwer/Springer, (2003)Temporal Authorization in the Simplified Event Calculus.. DBSec, volume 171 of IFIP Conference Proceedings, page 271-284. Kluwer, (1999)Secure knowledge exchange by policy algebra and erml., and . ICEIS (1), page 212-217. (2007)A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS Technology., , , and . ICCCNT, page 1-4. IEEE, (2020)An E-Learning Tool for Understanding Schedule Properties., and . ITCC, page 53-. IEEE Computer Society, (2003)Web Resource Usage Control in RSCLP.. DBSec, volume 144 of IFIP, page 281-294. Kluwer/Springer, (2004)Access Control for Deductive Databases by Logic Programming.. ICLP, volume 2401 of Lecture Notes in Computer Science, page 54-69. Springer, (2002)