Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Flexible Credential Negotiation Protocols., , and . Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 19-23. Springer, (2003)Enforcing Subscription-Based Authorization Policies in Cloud Scenarios., , , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 314-329. Springer, (2012)Data Security Issues in Cloud Scenarios., , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 3-10. Springer, (2015)Integrity for distributed queries., , , , , and . CNS, page 364-372. IEEE, (2014)Foreword from the Conference Chairs., , , and . NSS, IEEE, (2011)Assessing query privileges via safe and efficient permission composition., , , , and . ACM Conference on Computer and Communications Security, page 311-322. ACM, (2008)A modular approach to composing access control policies., , and . ACM Conference on Computer and Communications Security, page 164-173. ACM, (2000)Regulating Exceptions in Healthcare Using Policy Spaces., , , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 254-267. Springer, (2008)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , and . VLDB, page 123-134. ACM, (2007)Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , and . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)