Author of the publication

Imposing Fine-grain Next Generation Access Control over Database Queries.

, , , and . ABAC@CODASPY, page 9-15. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Policy Management for Handheld Devices., , , , and . Security and Management, page 199-204. CSREA Press, (2003)Proximity-Based Authentication for Mobile Devices., , and . Security and Management, page 398-404. CSREA Press, (2005)Composing and combining policies under the policy machine., , , and . SACMAT, page 11-20. ACM, (2005)Administering Access Control in Dynamic Coalitions., , , , and . LISA, page 249-261. USENIX, (2005)Application-Oriented Security Policies and Their Composition (Position Paper)., and . Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, page 67-74. Springer, (1998)Smart Card Authentication for Mobile Devices., , and . AISM, page 38-46. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Imposing Fine-grain Next Generation Access Control over Database Queries., , , and . ABAC@CODASPY, page 9-15. ACM, (2017)Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems., , and . MIST@CCS, page 13-22. ACM, (2016)A Unified Framework for Mobile Device Security., , and . Security and Management, page 9-14. CSREA Press, (2004)Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management., and . ACM Workshop on Role-Based Access Control, page 81-90. ACM, (1998)