Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement., , , , and . WEBIST (Revised Selected Papers), volume 372 of Lecture Notes in Business Information Processing, page 78-98. Springer, (2018)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Enhancing Security in ETSI Open Source MANO with Usage Control Capability., , , , , , , and . IM, page 25-29. IFIP, (2019)Exploiting Blockchain Technology for Attribute Management in Access Control Systems., , , and . GECON, volume 11819 of Lecture Notes in Computer Science, page 3-14. Springer, (2019)Federation and Security Aspects for the Management of the EHR in Italy., , , , , and . ADNTIIC, volume 7547 of Lecture Notes in Computer Science, page 26-37. Springer, (2011)A prototype for solving conflicts in XACML-based e-Health policies., , , and . CBMS, page 449-452. IEEE Computer Society, (2013)Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control., , , , , , , and . IEEE Commun. Mag., 58 (7): 65-71 (2020)