Author of the publication

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems.

, , and . ARES, page 153-160. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks., , , and . IEEE Trans. Dependable Secur. Comput., 12 (3): 256-269 (2015)Optimal Placement of Security Resources for the Internet of Things., , , and . The Internet of Things for Smart Urban Ecosystems, Springer, (2019)D-algebra for composing access control policy decisions., , and . AsiaCCS, page 298-309. ACM, (2009)MIST 2017: 9th International Workshop on Managing Insider Security Threats., and . CCS, page 2635-2636. ACM, (2017)NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures., , , , and . CODASPY, page 167-178. ACM, (2022)Result-Based Detection of Insider Threats to Relational Databases., and . CODASPY, page 133-143. ACM, (2019)Information carrying identity proof trees., , and . WPES, page 76-79. ACM, (2007)Efficient hierarchical key generation and key diffusion for sensor networks., , and . SECON, page 76-84. IEEE, (2005)A Game of Things: Strategic Allocation of Security Resources for IoT., , , and . IoTDI, page 185-190. ACM, (2017)A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP., and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 117-136. Springer, (2014)