Author of the publication

Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs.

, , and . ARES, page 3:1-3:10. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HA-Grid: Security Aware Hazard Analysis for Smart Grids., , , , , , and . SmartGridComm, page 446-452. IEEE, (2022)The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment., , , , , , , , , and 2 other author(s). POLICY, page 247-249. IEEE Computer Society, (2008)Security policy refinement using data integration: a position paper., , , , and . SafeConfig, page 25-28. ACM, (2009)PEACE: A Policy-Based Establishment of Ad-hoc Communities., , and . ACSAC, page 386-395. IEEE Computer Society, (2004)Conflict Analysis for Management Policies., and . Integrated Network Management, volume 86 of IFIP Conference Proceedings, page 430-443. Chapman & Hall, (1997)The Uses of Role Hierarchies in Access Control., and . ACM Workshop on Role-Based Access Control, page 153-160. ACM, (1999)Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices., and . IEEE Trans. Dependable Secur. Comput., 18 (2): 875-888 (2021)An Efficient Policy System for Body Sensor Networks., , , , , and . ICPADS, page 383-390. IEEE Computer Society, (2008)Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?, and . EDOC, page 273-284. IEEE Computer Society, (2002)Use of Roles and Policies for Specifying and Managing a Virtual Enterprise., , and . RIDE, page 72-79. IEEE Computer Society, (1999)