Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
> Publications > Can Access Control be Extended to Deal with Data Handling in Privacy Scenarios?