From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.. ACM Conference on Computer and Communications Security, стр. 125-134. ACM, (1997)Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.. IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 193-207. Springer, (2013)A collaborative approach to autonomic security protocols., и . NSPW, стр. 13-21. ACM, (2004)Conduit cascades and secure synchronization.. NSPW, стр. 141-150. ACM, (2000)Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).. AVI, стр. 428. ACM Press, (2010)Authorisation Subterfuge by Delegation in Decentralised Networks., и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 97-102. Springer, (2005)Reasoning about firewall policies through refinement and composition., и . J. Comput. Secur., 26 (2): 207-254 (2018)Avoiding inconsistencies in the Security Content Automation Protocol., и . CNS, стр. 454-461. IEEE, (2013)Automated Smartphone Security Configuration., , и . DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2012)Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration., , , , и . IPOM, том 4268 из Lecture Notes in Computer Science, стр. 168-180. Springer, (2006)