Author of the publication

Fine-Grained Access Control with Object-Sensitive Roles.

, , , and . ECOOP, volume 5653 of Lecture Notes in Computer Science, page 173-194. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFC in cell phones: The new paradigm for an interactive world Near-Field Communications.. IEEE Communications Magazine, 47 (6): 22-28 (2009)Engage: a deployment management system., , and . PLDI, page 263-274. ACM, (2012)Joining dataflow with predicates., , and . ESEC/SIGSOFT FSE, page 227-236. ACM, (2005)Ensuring consistency in long running transactions., and . ASE, page 54-63. ACM, (2007)Tasks: language support for event-driven programming., , and . PEPM, page 134-143. ACM, (2007)Fine-Grained Access Control with Object-Sensitive Roles., , , and . ECOOP, volume 5653 of Lecture Notes in Computer Science, page 173-194. Springer, (2009)A Theory of Role Composition., and . ICWS, page 320-328. IEEE Computer Society, (2008)The Consistency of Web Conversations., , and . ASE, page 415-418. IEEE Computer Society, (2008)Compositional Verification by Model Checking for Counter-Examples., , and . ISSTA, page 224-238. ACM, (1996)Programming by Composing Filters., and . LPAR, volume 46 of EPiC Series in Computing, page 1-13. EasyChair, (2017)