Author of the publication

Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks.

, , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 237-251. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Prototype for Enforcing Usage Control Policies Based on XACML., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 79-92. Springer, (2012)A Smart Contract Based Recommender System., , , and . GECON, volume 11819 of Lecture Notes in Computer Science, page 29-42. Springer, (2019)Enforcement of U-XACML History-Based Usage Control Policy., , , and . STM, volume 9871 of Lecture Notes in Computer Science, page 64-81. Springer, (2016)Towards Continuous Usage Control on Grid Computational Services., , and . ICAS/ICNS, page 82. IEEE Computer Society, (2005)Enhancing Usage Control for Performance: An Architecture for Systems of Systems., , , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 69-84. Springer, (2018)A model for usage control in GRID systems., and . SecureComm, page 169-175. IEEE, (2007)Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)Introducing Usage Control in MQTT., , , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 35-43. Springer, (2017)Non Fungible Mutable Tokens: dynamic assets traceability for the Metaverse., , , , and . MetaCom, page 393-397. IEEE, (2023)Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 237-251. (2017)