From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service., , и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 41-53. Springer, (2014)Adopting Provenance-Based Access Control in OpenStack Cloud IaaS., , и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 15-27. Springer, (2014)The GURA_G GURA G Administrative Model for User and Group Attribute Assignment., и . NSS, том 9955 из Lecture Notes in Computer Science, стр. 318-332. Springer, (2016)An Attribute-Based Protection Model for JSON Documents., , и . NSS, том 9955 из Lecture Notes in Computer Science, стр. 303-317. Springer, (2016)DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things., , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 278-290. Springer, (2021)Towards a Times-Based Usage Control Model., , , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2007)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , и . CODASPY, стр. 59-70. ACM, (2017)Stale-safe security properties for group-based secure information sharing., , , и . FMSE, стр. 53-62. ACM, (2008)Secure Information and Resource Sharing in Cloud Infrastructure as a Service., , и . WISCS@CCS, стр. 81-90. ACM, (2014)Issues in RBAC.. ACM Workshop on Role-Based Access Control, ACM, (1995)