Author of the publication

Obligation Based Access Control.

, and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 108-116. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Distributed Workflows for Crisis Management Decision Makers., , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 226-236. Springer, (2008)Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies., and . SECRYPT, page 386-393. INSTICC Press, (2007)A Privacy Preserving Framework for Mobile and Cloud., , , and . MOBILESoft, page 160-161. IEEE Computer Society, (2015)LWESP: Light-Weight Exterior Sensornet Protocol., , , and . ISCC, page 913-919. IEEE Computer Society, (2009)Security for Distributed Machine Learning., , and . SECRYPT, page 838-843. SCITEPRESS, (2023)Obligation Based Access Control., and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 108-116. Springer, (2014)Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection., , , and . ICETE (2), page 439-447. SciTePress, (2019)Context-Aware Security Policy for the Service Discovery., , and . AINA Workshops (1), page 477-482. IEEE Computer Society, (2007)Web based communication between embedded systems and an ERP., , and . INDIN, page 551-556. IEEE, (2009)Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference., , , and . ICETE (2), page 313-320. SciTePress, (2018)