From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flexible support for multiple access control policies, , , и . ACM Transactions on Database Systems (TODS), (июня 2001)Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case., , и . DBSec, том A-47 из IFIP Transactions, стр. 135-158. North-Holland, (1993)Subject Switching Algorithms for Access Control in Federated Databases., , и . DBSec, том 215 из IFIP Conference Proceedings, стр. 61-74. Kluwer, (2001)A Novel Approach to Certificate Revocation Management., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 225-238. Kluwer, (2001)A Two-tier Coarse Indexing Scheme for MLS Database Systems., , и . DBSec, том 113 из IFIP Conference Proceedings, стр. 199-218. Chapman & Hall, (1997)Referential Integrity in Multilevel Secure Database Management Systems., и . SEC, том A-15 из IFIP Transactions, стр. 359-371. North-Holland, (1992)Algebra for Databases with Explicit Markings of Damaged Data., и . IICIS, том 136 из IFIP Conference Proceedings, стр. 103-129. Kluwer, (1998)A Unified Framework for Enforcing Multiple Access Control Policies., , , и . SIGMOD Conference, стр. 474-485. ACM Press, (1997)Distributed Query Evaluation over Encrypted Data., , , , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 96-114. Springer, (2021)Threat Modeling for Cloud Data Center Infrastructures., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 302-319. Springer, (2016)