Author of the publication

Role Slices: A Notation for RBAC Permission Assignment and Enforcement.

, , , , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 40-53. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Adaptive Activity Planning in Education: Implementation and Case Study., , , , , , , , , and 2 other author(s). CSEDU (Selected Papers), volume 583 of Communications in Computer and Information Science, page 112-131. Springer, (2015)MiDAS: A Model-Driven Approach for Adaptive Software., , and . WEBIST, page 281-286. SciTePress, (2015)Adaptation and disability aspects in a virtual learning environment., , and . Rev. Avances en Sistemas Informática, 9 (1): 6-14 (2012)A Framework of Composable Access Control Definition, Enforcement and Assurance., , and . SCCC, page 13-22. IEEE Computer Society, (2008)A Framework for Composable Security Definition, Assurance, and Enforcement., , and . MoDELS (Satellite Events), volume 3844 of Lecture Notes in Computer Science, page 353-354. Springer, (2005)ASHYI-EDU: Applying Dynamic Adaptive Planning in a Virtual Learning Environment., , , , , , , , , and . CSEDU (1), page 52-63. SciTePress, (2015)An Architecture for Dynamic and Adaptive User Activity Planning Systems., , , , , , , , and . WEBIST, page 228-235. SciTePress, (2015)Improving the Decision-Making Support in Context-Aware Applications: The Case of an Adaptive Virtual Education Learning Management System., , , and . CIbSE, page 220-233. Curran Associates, (2018)A framework of composable access control features: Preserving separation of access control concerns from models to code., , and . Comput. Secur., 29 (3): 350-379 (2010)A framework for security assurance of access control enforcement code., , and . Comput. Secur., 29 (7): 770-784 (2010)