Author of the publication

Typing for Conflict Detection in Access Control Policies.

, , , , and . MCETECH, volume 26 of Lecture Notes in Business Information Processing, page 212-226. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inconsistency detection method for access control policies., , , and . IAS, page 204-209. IEEE, (2010)How to Make Your Agents Fulfil Their Obligations., , and . PAAM, page 255-276. Practical Application Company Ltd., (1998)Detecting incompleteness in access control policies using data classification schemes., , , and . ICDIM, page 417-422. IEEE, (2010)Feature-Interaction Resolution Using Fuzzy Policies., , , and . FIW, page 94-112. IOS Press, (2000)A High Level Visual Notation for Understanding and Designing Collaborative, Adaptive Behavior in Multiagent Systems., , , and . HICSS (6), page 180-. IEEE Computer Society, (1998)The PADRES Distributed Publish/Subscribe System., , , and . FIW, page 12-30. IOS Press, (2005)Feature-Interaction Visualisation and Resolution in an Agent Environment., , , , , and . FIW, page 135-149. IOS Press, (1998)Symptom-based problem determination using log data abstraction., , , and . CASCON, page 313-326. ACM, (2010)Understanding and Defining the Behaviour of Systems of Agents with Use-Case Maps., , , , and . PAAM, page 527-528. Practical Application Company Ltd., (1997)Root cause analysis and diagnosis in SOA and cloud environments., , , and . CASCON, page 335-336. ACM, (2009)