Author of the publication

Access Control Policy Combinations for the Grid Using the Policy Machine.

, , and . CCGRID, page 225-232. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification of attribute relations for access control policies and constraints using Policy Machine., , and . IAS, page 32-35. IEEE, (2010)The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems.. SpaCCS, volume 12382 of Lecture Notes in Computer Science, page 173-187. Springer, (2020)The Computational Complexity of Enforceability Validation for Generic Access Control Rules., , and . SUTC (1), page 260-267. IEEE Computer Society, (2006)Implementing and Managing Policy Rules in Attribute Based Access Control., , , , and . IRI, page 518-525. IEEE Computer Society, (2015)Policy Mediation for Multi-Enterprise Environments., , , , , and . ACSAC, page 100-106. IEEE Computer Society, (2000)Composing and combining policies under the policy machine., , , and . SACMAT, page 11-20. ACM, (2005)Verification of Resilience Policies that Assist Attribute Based Access Control., , , and . ABAC@CODASPY, page 43-52. ACM, (2017)Property Verification for Generic Access Control Models., , and . EUC (2), page 243-250. IEEE Computer Society, (2008)978-0-7695-3492-3.An Access Control scheme for Big Data processing., , , and . CollaborateCom, page 1-7. ICST / IEEE, (2014)