Author of the publication

Specification of attribute relations for access control policies and constraints using Policy Machine.

, , and . IAS, page 32-35. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Specification of attribute relations for access control policies and constraints using Policy Machine., , and . IAS, page 32-35. IEEE, (2010)Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems.. SpaCCS, volume 12382 of Lecture Notes in Computer Science, page 173-187. Springer, (2020)Implementing and Managing Policy Rules in Attribute Based Access Control., , , , and . IRI, page 518-525. IEEE Computer Society, (2015)The Computational Complexity of Enforceability Validation for Generic Access Control Rules., , and . SUTC (1), page 260-267. IEEE Computer Society, (2006)Policy Mediation for Multi-Enterprise Environments., , , , , and . ACSAC, page 100-106. IEEE Computer Society, (2000)Composing and combining policies under the policy machine., , , and . SACMAT, page 11-20. ACM, (2005)An Access Control scheme for Big Data processing., , , and . CollaborateCom, page 1-7. ICST / IEEE, (2014)Property Verification for Generic Access Control Models., , and . EUC (2), page 243-250. IEEE Computer Society, (2008)978-0-7695-3492-3.Assessing Quality of Policy Properties in Verification of Access Control Policies., , , and . ACSAC, page 163-172. IEEE Computer Society, (2008)