Author of the publication

A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies.

, , and . STM, volume 9331 of Lecture Notes in Computer Science, page 55-71. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Lists with Non-stably Infinite Theories., , and . LPAR, volume 3452 of Lecture Notes in Computer Science, page 51-66. Springer, (2004)Automated Analysis of Parametric Timing-Based Mutual Exclusion Algorithms., , , and . NASA Formal Methods, volume 7226 of Lecture Notes in Computer Science, page 279-294. Springer, (2012)Boosting Model Checking to Analyse Large ARBAC Policies., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 273-288. Springer, (2012)ASASPXL: New Clother for Analysing ARBAC Policies., and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 267-284. (2016)A delegated authorization solution for smart-city mobile applications., , and . RTSI, page 1-6. IEEE, (2016)Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities., , , , , and . ARES, page 20:1-20:11. ACM, (2023)Automated Analysis of Infinite State Workflows with Access Control Policies., and . STM, volume 7170 of Lecture Notes in Computer Science, page 157-174. Springer, (2011)Light-Weight SMT-based Model Checking., , and . AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 85-102. Elsevier, (2008)Reachability Modulo Theory Library., , , , and . SMT@IJCAR, volume 20 of EPiC Series in Computing, page 67-76. EasyChair, (2012)ASASP: Automated Symbolic Analysis of Security Policies., , and . CADE, volume 6803 of Lecture Notes in Computer Science, page 26-33. Springer, (2011)