Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approach to Supporting Continuity of Usage in Location-Based Access Control., , and . FTDCS, page 199-205. IEEE Computer Society, (2008)An Access Control System for a Web Map Management Service., , and . RIDE, page 33-39. IEEE Computer Society, (2004)Interactive Location Cloaking with the PROBE Obfuscator., , , and . Mobile Data Management, page 355-356. IEEE Computer Society, (2009)Data security in location-aware applications: an approach based on RBAC., , and . Int. J. Inf. Comput. Secur., 1 (1/2): 5-38 (2007)Foreword for the special issue of selected papers from the 3rd ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., and . Trans. Data Priv., 4 (2): 51-53 (2011)Fine-grained Stop-Move Detection in UWB-based Trajectories., , , and . PerCom, page 111-118. IEEE, (2022)Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems., , and . ARES, page 153-160. IEEE Computer Society, (2008)Stop@: A framework for scalable and noise-resistant stop-move segmentation of large datasets of trajectories in outdoor and indoor spaces., and . SoftwareX, (2024)Protecting location privacy against spatial inferences: the PROBE approach., , and . SPRINGL, page 32-41. ACM, (2009)Prox-RBAC: a proximity-based spatially aware RBAC., , and . GIS, page 339-348. ACM, (2011)