Author of the publication

Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.

, , , and . Comput. Commun., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Usage Control in MQTT., , , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 35-43. Springer, (2017)Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)A Prototype for Enforcing Usage Control Policies Based on XACML., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 79-92. Springer, (2012)A model for usage control in GRID systems., and . SecureComm, page 169-175. IEEE, (2007)Measuring EOS.IO DApp Resource Allocation and Costs through a Benchmark Application., , , and . ICBTA, page 24-30. ACM, (2021)The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis., , and . SECRYPT, page 511-519. SCITEPRESS, (2023)Towards Continuous Usage Control on Grid Computational Services., , and . ICAS/ICNS, page 82. IEEE Computer Society, (2005)Enhancing Usage Control for Performance: An Architecture for Systems of Systems., , , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 69-84. Springer, (2018)Implementing Usage Control in Internet of Things: A Smart Home Use Case., , , and . TrustCom/BigDataSE/ICESS, page 1056-1063. IEEE Computer Society, (2017)Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things., , , , and . TrustCom/BigDataSE, page 1844-1851. IEEE, (2018)