From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fog Computing Model for the Information Flow Control., , и . NBiS, том 526 из Lecture Notes in Networks and Systems, стр. 25-34. Springer, (2022)Design and Implementing of the Dynamic Tree-Based Fog Computing (DTBFC) Model to Realize the Energy-Efficient IoT., , , , и . EIDWT, том 65 из Lecture Notes on Data Engineering and Communications Technologies, стр. 71-81. Springer, (2021)Synchronization Protocols to Prevent Illegal Information Flow in Role-Based Access Control Systems., , , , и . CISIS, стр. 279-286. IEEE Computer Society, (2014)Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model., , , , и . EIDWT, том 29 из Lecture Notes on Data Engineering and Communications Technologies, стр. 80-91. Springer, (2019)Trustworthiness in Peer-to-Peer Systems., , , и . NBiS, стр. 652-657. IEEE Computer Society, (2015)Energy-aware Migration of Virtual Machines in a Cluster., , , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 21-32. Springer, (2016)A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow among Objects., , , и . J. Mobile Multimedia, 11 (3&4): 263-280 (2015)The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS System., , , и . BWCCA, том 97 из Lecture Notes in Networks and Systems, стр. 471-482. Springer, (2019)A Nodes Selection Algorithm for Fault Recovery in the GTBFC Model., , , и . BWCCA, том 97 из Lecture Notes in Networks and Systems, стр. 81-92. Springer, (2019)Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption Model., , , , и . BWCCA, том 97 из Lecture Notes in Networks and Systems, стр. 483-493. Springer, (2019)