From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Role-Based Workflow Models., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 166-181. Chapman & Hall, (1997)Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things., и . SACMAT, стр. 193-204. ACM, (2018)Conceptual Foundations for a Model of Task-based Authorizations., и . CSFW, стр. 66-79. IEEE Computer Society, (1994)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , и . CSFW, стр. 159-165. IEEE Computer Society, (1990)Machine Learning in Access Control: A Taxonomy and Survey., , , , , и . CoRR, (2022)Towards a Times-Based Usage Control Model., , , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2007)Stale-safe security properties for group-based secure information sharing., , , и . FMSE, стр. 53-62. ACM, (2008)Secure Information and Resource Sharing in Cloud Infrastructure as a Service., , и . WISCS@CCS, стр. 81-90. ACM, (2014)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , и . CODASPY, стр. 59-70. ACM, (2017)