From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Role-based privilege and trust management., и . Comput. Syst. Sci. Eng., (2005)A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , и . AAMAS, стр. 178-186. ACM, (2017)The RSL99 Language for Role-Based Separation of Duty Constraints., и . ACM Workshop on Role-Based Access Control, стр. 43-54. ACM, (1999)Certification process artifacts defined as measurable units for software assurance., , и . Softw. Process. Improv. Pract., 12 (2): 165-189 (2007)Toward Standardization of Authenticated Caller ID Transmission., , , и . IEEE Commun. Stand. Mag., 1 (3): 30-36 (2017)Reconstructing a formal security model., , и . Inf. Softw. Technol., 44 (11): 649-657 (2002)Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer., , , , , , и . DSN, стр. 261-273. IEEE, (2023)Efficient construction of provably secure steganography under ordinary covert channels., , , , и . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Security and Privacy Challenges in Cloud Computing Environments., , и . IEEE Secur. Priv., 8 (6): 24-31 (2010)CONUGA: Constrained User-Group Assignment., и . J. Netw. Comput. Appl., 24 (2): 87-100 (2001)