Author of the publication

Automating Privacy Enforcement in Cloud Platforms.

, , , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 160-173. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DLoc: Distributed Auditing for Data Location Compliance in Cloud., , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 202-218. Springer, (2017)ROCK Algorithm Parallelization with TOREADOR Primitives., , , , and . AINA Workshops, page 402-407. IEEE Computer Society, (2018)Rewrite Based Specification of Access Control Policies., , and . SecReT@LICS/CSF, volume 234 of Electronic Notes in Theoretical Computer Science, page 37-54. Elsevier, (2008)Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data., , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 151-164. Springer, (2019)Towards Accountable Services in the Cloud., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 470-474. Springer, (2012)Simulating Deception for Web Applications Using Reinforcement Learning., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 719-737. Springer, (2023)Weaving rewrite-based access control policies., , , and . FMSE, page 71-80. ACM, (2007)Réécriture et Modularité pour les Politiques de Sécurité. (Term Rewriting and Modularity for Security Policies).. Henri Poincaré University, Nancy, France, (2008)AAL and Static Conflict Detection in Policy., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 367-382. (2016)Simulating Algebraic Specification Genericity on Languages with Initial Semantics., and . WMF, volume 95 of Electronic Notes in Theoretical Computer Science, page 131-148. Elsevier, (2003)