Aliaksandr Lazouski

According to our database1, Aliaksandr Lazouski authored at least 24 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

2016
Usage Control on Cloud systems.
Future Gener. Comput. Syst., 2016

2014
Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Usage Control in Cloud Federations.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties.
IEEE Syst. J., 2013

Towards Attribute-Based Access Control Policy Engineering Using Risk.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Towards Policy Engineering for Attribute-Based Access Control.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
A Prototype for Enforcing Usage Control Policies Based on XACML.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Usage control in cloud systems.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Access and Usage Control in Grid.
PhD thesis, 2011

Cost-effective Enforcement of UCON<sub>A</sub> Policies.
Proceedings of the CRiSIS 2011, 2011

2010
Access and Usage Control in Grid Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Usage control in computer security: A survey.
Comput. Sci. Rev., 2010

Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Influence of Attribute Freshness on Decision Making in Usage Control.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Risk-Based Usage Control for Service Oriented Architecture.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009

A Proposal on Enhancing XACML with Continuous Usage Control Features.
Proceedings of the Grids, 2009

On Usage Control for GRID Services.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008


  Loading...