Maarten Decat

According to our database1, Maarten Decat authored at least 12 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Amusa: middleware for efficient access control management of multi-tenant SaaS applications.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

On the Need for Federated Authorization in Cross-organizational e-Health Platforms.
Proceedings of the HEALTHINF 2015, 2015

Scalable and Secure Concurrent Evaluation of History-based Access Control Policies.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Entity-Based Access Control: supporting more expressive access control policies.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Privacy and Access Control in Federated Social Networks.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Middleware for efficient and confidentiality-aware federation of access control policies.
J. Internet Serv. Appl., 2014

Characterizing the performance of tenant data management in multi-tenant cloud authorization systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2013
Federated Authorization for Software-as-a-Service Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Introducing concurrency in policy-based access control.
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013

2012
Toward efficient and confidentiality-aware federation of access control policies.
Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 2012

2010
Security of Web Mashups: A Survey.
Proceedings of the Information Security Technology for Applications, 2010


  Loading...