Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture., and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 403-428. Springer, (1994)Access Control: The Neglected Frontier.. ACISP, volume 1172 of Lecture Notes in Computer Science, page 219-227. Springer, (1996)RABAC: Role-Centric Attribute-Based Access Control., , and . MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 84-96. Springer, (2012)Future Directions in Role-Based Access Control Models.. MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 22-26. Springer, (2001)An Access Control Language for a General Provenance Model., , , , and . Secure Data Management, volume 5776 of Lecture Notes in Computer Science, page 68-88. Springer, (2009)Conceptual Foundations for a Model of Task-based Authorizations., and . CSFW, page 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , and . CSFW, page 159-165. IEEE Computer Society, (1990)Speculations on the science of web user security.. Comput. Networks, 56 (18): 3891-3895 (2012)Secure Role-Based Workflow Models., and . DBSec, volume 215 of IFIP Conference Proceedings, page 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., and . DBSec, volume 113 of IFIP Conference Proceedings, page 166-181. Chapman & Hall, (1997)