From post

Efficient enforcement of action-aware purpose-based access control within relational database management systems.

, и . ICDE, стр. 1516-1517. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control Administration Policies.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)A multi-layer framework for personalized social tag-based applications., , и . Data Knowl. Eng., (2012)Trust-Chi: An XML Framework for Trust Negotiations., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 146-157. Springer, (2003)Policies for Composed Emergencies in Support of Disaster Management., , и . Secure Data Management, том 7482 из Lecture Notes in Computer Science, стр. 75-92. Springer, (2012)Web Data Protection: Principles and Research Issues.. EDBT Workshops, том 3268 из Lecture Notes in Computer Science, стр. 526-535. Springer, (2004)Signature and Access Control Policies for XML Documents., , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 1-22. Springer, (2003)Fine-Grained Access Control Within NoSQL Document-Oriented Datastores., и . Data Sci. Eng., 1 (3): 127-138 (2016)Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET., , , и . HOTPOST@MobiHoc, стр. 7-12. ACM, (2015)Detecting anomalies in social network data consumption., , , и . Soc. Netw. Anal. Min., 4 (1): 231 (2014)A temporal key management scheme for secure broadcasting of XML documents., , и . ACM Conference on Computer and Communications Security, стр. 31-40. ACM, (2002)