selected publications
-
book
-
chapter
- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. Lecture notes in computer science. 209-226. 2014
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. Lecture notes in computer science. 207-222. 2013