selected publications
-
academic article
- Editorial. Journal of Information Security and Applications. 18:1-1. 2013
- Role Mining to Assist Authorization Governance. International Journal of Secure Software Engineering. 3:45-64. 2012
- A delegation model for extended RBAC. International Journal of Information Security. 9:209-236. 2010
-
book
-
chapter
- Adapted Quantization Index Modulation for Database Watermarking. Lecture notes in computer science. 120-134. 2015
- Data Quality Evaluation in Medical Database Watermarking. Studies in health technology and informatics. 2015
- Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. IFIP advances in information and communication technology. 218-233. 2015
- Privacy Preserving Record Matching Using Automated Semi-trusted Broker. Lecture notes in computer science. 103-118. 2015
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. Lecture notes in computer science. 207-222. 2013
- Model-Driven Extraction and Analysis of Network Security Policies. Lecture notes in computer science. 52-68. 2013
- Privacy-Aware Organisation-Based Access Control Model (PrivOrBAC). IGI Global eBooks. 1656-1679. 2013
- Towards an Access-Control Metamodel for Web Content Management Systems. Lecture notes in computer science. 148-155. 2013
- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. Lecture notes in computer science. 33-47. 2012
- Privacy-Aware Organisation-Based Access Control Model (PrivOrBAC). Advances in information security, privacy, and ethics book series. 335-360. 2012
- Contextual Privacy Management in Extended Role Based Access Control Model. Lecture notes in computer science. 121-135. 2010
- An Extended Role-Based Access Control Model for Delegating Obligations. Lecture notes in computer science. 127-137. 2009
- Revocation Schemes for Delegation Licences. Lecture notes in computer science. 190-205. 2008
-
conference paper
- Privacy-enhanced filtering and collection middleware in EPCglobal networks. . 1-8. 2013
- Proceedings of the 5th international conference on Foundations and Practice of Security. Foundations and Practice of Security. 2012