Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint-enhanced role engineering via answer set programming., , , and . AsiaCCS, page 73-74. ACM, (2012)Role updating for assignments., , , and . SACMAT, page 89-98. ACM, (2010)On Role Mappings for RBAC-Based Secure Interoperation., , and . NSS, page 270-277. IEEE Computer Society, (2009)Inconsistency resolving of safety and utility in access control., , , and . EURASIP J. Wirel. Commun. Netw., (2011)Explainable Global Wildfire Prediction Models using Graph Neural Networks., , , , and . CoRR, (2024)A logic for authorization provenance., , , and . AsiaCCS, page 238-249. ACM, (2010)Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments., , and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 49-63. Springer, (2007)Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control., , , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 403-410. Springer, (2009)Context Awareness through Reasoning on Private Analysis for Android Application., , , and . CSCloud, page 148-156. IEEE Computer Society, (2015)Managing Authorization Provenance: A Modal Logic Based Approach., , , and . ICTAI, page 621-624. IEEE Computer Society, (2009)