From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)State-of-the-art in privacy preserving data mining, , , , , и . SIGMOD Rec., 33 (1): 50--57 (марта 2004)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , и . TrustCom/BigDataSE/ISPA (1), стр. 718-725. IEEE, (2015)Preventing velocity-based linkage attacks in location-aware applications., , , и . GIS, стр. 246-255. ACM, (2009)Context-Dependent Authentication and Access Control., и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 63-75. Springer, (2009)Security Issues for Distributed Fusion in Coalition Environments., , , и . FUSION, стр. 830-837. IEEE, (2018)TRBAC: a temporal role-based access control model., , и . ACM Workshop on Role-Based Access Control, стр. 21-30. ACM, (2000)A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations., , и . DEXA (1), том 6261 из Lecture Notes in Computer Science, стр. 368-384. Springer, (2010)An infrastructure for managing secure update operations on XML data., , , и . SACMAT, стр. 110-122. ACM, (2003)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , и . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)