From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases., и . IEEE Trans. Knowl. Data Eng., 8 (1): 16-31 (1996)Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments.. ACM Workshop on Role-Based Access Control, стр. 13-19. ACM, (1997)Visual Authorization Modeling in E-commerce Applications., , , и . IEEE Multim., 10 (1): 44-54 (2003)A Secure Kernelized Architecture for Multiple Object-Oriented Databases., , и . CSFW, стр. 139-152. IEEE Computer Society, (1991)Models for coalition-based access control (CBAC)., , , и . SACMAT, стр. 97-106. ACM, (2002)Flexible team-based access control using contexts., , , и . SACMAT, стр. 21-27. ACM, (2001)Towards a Multi-dimensional Characterization of Dissemination Control., и . POLICY, стр. 197-200. IEEE Computer Society, (2004)First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions., , и . CCS, стр. 1705-1706. ACM, (2015)A Visual Language for Authorization Modeling., , , и . VL, стр. 110-118. IEEE Computer Society, (1997)Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs., , , , и . Wireless Information Systems, стр. 61-70. INSTICC Press, (2005)972-8865-21-X.