Author of the publication

Access control: principle and practice

, and . IEEE Communications Magazine, 32 (9): 40-48 (September 1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal model and policy specification of usage control., , , and . ACM Trans. Inf. Syst. Secur., 8 (4): 351-387 (2005)Toward a Usage-Based Security Framework for Collaborative Computing Systems., , , and . ACM Trans. Inf. Syst. Secur., 11 (1): 3:1-3:36 (2008)The UCONABC usage control model., and . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)Conceptual Foundations for a Model of Task-based Authorizations., and . CSFW, page 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , and . CSFW, page 159-165. IEEE Computer Society, (1990)Speculations on the science of web user security.. Comput. Networks, 56 (18): 3891-3895 (2012)Towards a Times-Based Usage Control Model., , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 227-242. Springer, (2007)Securing Big Data Applications in the Cloud Guest editors' introduction., , and . IEEE Cloud Comput., 1 (3): 24-26 (2014)A User-Activity-Centric Framework for Access Control in Online Social Networks., , and . IEEE Internet Comput., 15 (5): 62-65 (2011)Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure., , , , and . IEEE Access, (2021)