Author of the publication

Property Verification for Generic Access Control Models.

, , and . EUC (2), page 243-250. IEEE Computer Society, (2008)978-0-7695-3492-3.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security or Privacy: Can You Have Both?, , and . Computer, 53 (9): 20-30 (2020)Efficient Algorithms for T-way Test Sequence Generation., , , , and . ICECCS, page 220-229. IEEE Computer Society, (2012)The Computational Complexity of Enforceability Validation for Generic Access Control Rules., , and . SUTC (1), page 260-267. IEEE Computer Society, (2006)Fault localization based on failure-inducing combinations., , , , and . ISSRE, page 168-177. IEEE Computer Society, (2013)Implementing and Managing Policy Rules in Attribute Based Access Control., , , , and . IRI, page 518-525. IEEE Computer Society, (2015)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing., , , and . Math. Comput. Sci., 15 (4): 741 (2021)A Combinatorial Approach to Explaining Image Classifiers., , , and . ICST Workshops, page 35-43. IEEE, (2021)Combinatorially XSSing Web Application Firewalls., , , , , and . ICST Workshops, page 85-94. IEEE, (2021)