Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Evaluation of Distributed Workflow Algorithms., , and . ISAS-SCI (1), page 183-188. IIIS, (2001)Electronic Negotiation of Government Contracts through Transducers., , and . DG.O, Digital Government Research Center, (2003)Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications., , and . DG.O, Digital Government Research Center, (2004)Enhancing the government service experience through QR codes on mobile platforms., , , , and . Gov. Inf. Q., 31 (1): 6-16 (2014)The role mining problem: A formal perspective., , and . ACM Trans. Inf. Syst. Secur., 13 (3): 27:1-27:31 (2010)Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration., , , and . CIC, page 136-145. IEEE Computer Society, (2017)Enabling Attribute-Based Access Control in Linux Kernel., , , and . AsiaCCS, page 1237-1239. ACM, (2022)An efficient online auditing approach to limit private data disclosure., , , and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 636-647. ACM, (2009)A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions., , and . IICIS, volume 193 of IFIP, page 319-333. Springer, (2004)Inter-instance authorization constraints for secure workflow management., and . SACMAT, page 190-199. ACM, (2006)