1. Modeling and Re-Evaluating Security in an Incremental Development of RBAC-Based Systems Using B Method;Exploring Security in Software Architecture and Design;2019
2. A Fine-Grained Access Control Model and Implementation;Proceedings of the 18th International Conference on Computer Systems and Technologies;2017-06-23
3. Validation of IS Security Policies Featuring Authorisation Constraints;International Journal of Information System Modeling and Design;2015-01
4. Automated Reviewing of Healthcare Security Policies;Foundations of Health Information Engineering and Systems;2013
5. Anomaly Discovery and Resolution in MySQL Access Control Policies;Lecture Notes in Computer Science;2012