Author of the publication

A Semantic aware Access Control model with real time constraints on history of accesses.

, , and . IMCSIT, page 827-836. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Enhancement for a Low Computation Cost User Authentication Scheme., , and . SECRYPT, page 5-8. INSTICC Press, (2006)An Access Control Framework for Pervasive Computing Environments., , and . PSC, page 97-103. CSREA Press, (2006)k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 263-273. Springer, (2012)Access control aware data retrieval for secret sharing based database outsourcing., , and . Distributed Parallel Databases, 34 (4): 505-534 (2016)Cooperative security administration in multi-security-domain environments using a variant of deontic logic., , , and . Sci. Iran., 19 (3): 635-653 (2012)Access control enforcement on outsourced data ensuring privacy of access control policies., , and . HPCS, page 491-497. IEEE, (2011)DSCA: an inline and adaptive application identification approach in encrypted network traffic., , and . ICCSP, page 39-43. ACM, (2019)Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants., , , , and . IACR Cryptol. ePrint Arch., (2022)AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems., and . SECURWARE, page 31-36. IEEE Computer Society, (2009)Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)., , , , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 256-268. Springer, (2005)