From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning in Access Control: A Taxonomy and Survey., , , , , и . CoRR, (2022)Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy., , и . ABAC@CODASPY, стр. 1-12. ACM, (2016)The HABAC Model for Smart Home IoT and Comparison to EGRBAC., и . SAT-CPS@CODASPY, стр. 39-48. ACM, (2021)Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars., , , и . CODASPY, стр. 61-72. ACM, (2019)Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems., , , и . CODASPY, стр. 283-285. ACM, (2023)Blockchain-Based Administration of Access in Smart Home IoT., , и . SAT-CPS@CODASPY, стр. 57-66. ACM, (2022)Security and Privacy for Emerging IoT and CPS Domains., , , , , , и . CODASPY, стр. 336-337. ACM, (2022)Convergent Access Control to Enable Secure Smart Communities., и . TPS-ISA, стр. 148-156. IEEE, (2020)Secure Role-Based Workflow Models., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 166-181. Chapman & Hall, (1997)