From post

Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation.

, , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 153-164. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation., , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 153-164. Springer, (2010)User-Centric Identity Management: New Trends in Standardization and Regulation., , , и . IEEE Secur. Priv., 5 (4): 84-87 (2007)Privacy Enforcement for IT Governance in Enterprises: Doing It for Real., , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 226-235. Springer, (2005)Towards Accountable Management of Privacy and Identity Information., , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 146-161. Springer, (2003)A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care., , и . DEXA Workshops, стр. 432-437. IEEE Computer Society, (2003)Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services., , и . DEXA Workshops, стр. 377-382. IEEE Computer Society, (2003)