Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foreword for the special issue of selected papers from the 3rd ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., and . Trans. Data Priv., 4 (2): 51-53 (2011)Data security in location-aware applications: an approach based on RBAC., , and . Int. J. Inf. Comput. Secur., 1 (1/2): 5-38 (2007)Fine-grained Stop-Move Detection in UWB-based Trajectories., , , and . PerCom, page 111-118. IEEE, (2022)Approach to Supporting Continuity of Usage in Location-Based Access Control., , and . FTDCS, page 199-205. IEEE Computer Society, (2008)An Access Control System for a Web Map Management Service., , and . RIDE, page 33-39. IEEE Computer Society, (2004)Interactive Location Cloaking with the PROBE Obfuscator., , , and . Mobile Data Management, page 355-356. IEEE Computer Society, (2009)Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems., , and . ARES, page 153-160. IEEE Computer Society, (2008)Spatial Knowledge-Based Applications and Technologies: Research Issues., and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 324-328. Springer, (2005)Mathematical programming algorithms for spatial cloaking., , , and . CTW, page 217-220. (2015)Towards movement-aware access control., and . SPRINGL, page 39-45. ACM, (2008)