Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating declarative semantics and usability in access control., , , and . SOUPS, page 14. ACM, (2012)Connectivity provisioning with security attributes., and . Softw. Focus, 2 (3): 112-116 (2001)Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes., , and . NDSS, The Internet Society, (2015)On mutually-exclusive roles and separation of duty., , and . CCS, page 42-51. ACM, (2004)Strengthening PUFs using Composition., , , and . ICCAD, page 1-8. ACM, (2019)Towards Formal Verification of Role-Based Access Control Policies., , , , and . IEEE Trans. Dependable Secur. Comput., 5 (4): 242-255 (2008)The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks., , and . CODASPY, page 337-348. ACM, (2015)A Correctness Proof of a Mesh Security Architecture., , , , and . CSF, page 315-330. IEEE Computer Society, (2008)The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid., and . ACM Conference on Computer and Communications Security, page 1391-1402. ACM, (2014)Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies., , and . SACMAT, page 15-26. ACM, (2015)