From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discussion Notes and Research Question List., , и . DBSec, стр. 263-280. North-Holland, (1988)Hidden Safety Requirements in Large-Scale Systems.. IFIP Congress (3), том A-53 из IFIP Transactions, стр. 295-302. North-Holland, (1994)How Far Can You Trust A Computer?. SAFECOMP, стр. 313-325. Springer, (1993)How Can We Enable Privacy in an Age of Big Data Analytics?. IWSPA@CODASPY, стр. 47. ACM, (2016)Formal Models for Computer Security.. ACM Comput. Surv., 13 (3): 247-278 (1981)A building code for building code: putting what we know works to work.. ACSAC, стр. 139-147. ACM, (2013)NRL invitational workshop on testing and proving: two approaches to assurance., , , , и . ACM SIGSOFT Softw. Eng. Notes, 11 (5): 63-85 (1986)Food for Thought: Improving the Market for Assurance.. IEEE Secur. Priv., 5 (3): 3-4 (2007)The use of quick prototypes in the secure military message systems project., , и . Rapid Prototyping, стр. 85-87. ACM, (1982)Challenges and Recent Advances in Developing Trustworthy Software-Based Systems., , , и . COMPSAC, стр. 208-. IEEE Computer Society, (2003)