Search for persons
X
?
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems ,
1
Automated Generation and Update of Structured ABAC Policies:
, In:
?
Logic-Based Program Synthesis and Transformation; Lecture Notes in Computer Science ,
2
Unification Modulo Equational Theories in Languages with Bi..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
4
The Category-Based Approach to Access Control, Obligations ..:
, In:
?
Logic-Based Program Synthesis and Transformation; Lecture Notes in Computer Science ,
6
From Static to Dynamic Access Control Policies via Attribut..:
, In:
?
8
Graph Transformation: 16th International Conference, ICGT 2..
Lecture Notes in Computer Science, 13961
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
9
Modular Composition of Access Control Policies: A Framework..:
, In:
?
Proceedings of the 24th International Symposium on Principles and Practice of Declarative Programming ,
10
Nominal Matching Logic:
, In:
?
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy ,
11
Session details: Session 2: Privacy:
, In:
?
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy ,
12