Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BareDroid: Large-Scale Analysis of Android Apps on Real Devices., , , , , , , and . ACSAC, page 71-80. ACM, (2015)Extending Mandatory Access Control Policies in Android., , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 21-35. Springer, (2015)A Model-driven Approach for Securing Software Architectures., , , , and . SECRYPT, page 595-602. SciTePress, (2013)Policy Specialization to Support Domain Isolation., , and . SafeConfig@CCS, page 33-38. ACM, (2015)SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases., , and . ACSAC, page 411-420. ACM, (2015)An SELinux-based intent manager for Android., , and . CNS, page 747-748. IEEE, (2015)AppPolicyModules: Mandatory Access Control for Third-Party Apps., , and . AsiaCCS, page 309-320. ACM, (2015)Improving Android security by widening the role of Mandatory Access Control., , , and . Tiny Trans. Comput. Sci., (2016)DockerPolicyModules: Mandatory Access Control for Docker containers., , , and . CNS, page 749-750. IEEE, (2015)On the notion of redundancy in access control policies., , , and . SACMAT, page 161-172. ACM, (2013)