Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning information release policies for preventing intersection attacks., , and . MILCOM, page 794-799. IEEE, (2017)Mission Support for Drones: a Policy Based Approach., , , , , and . DroNet@MobiSys, page 7-12. ACM, (2017)Research challenges in dynamic policy-based autonomous security., , , , , , and . IEEE BigData, page 2970-2973. IEEE Computer Society, (2017)Privacy enforcement through policy extension., , , , and . MILCOM, page 1096-1100. IEEE, (2016)Assessing trust over uncertain rules and streaming data., , , and . FUSION, page 922-929. IEEE, (2013)Global attestation of location in mobile devices., , , and . MILCOM, page 1612-1617. IEEE, (2015)Argumentation-based policy analysis for drone systems., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-6. IEEE, (2017)Location attestation and access control for mobile devices using GeoXACML., , , , and . J. Netw. Comput. Appl., (2017)Improving data sharing in data rich environments., , , , , and . IEEE BigData, page 2998-3005. IEEE Computer Society, (2017)Location Security - Where to Enforce?, , and . MILCOM, page 1651-1656. IEEE, (2014)