From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy in Social Networks, , и . Encyclopedia of Information Science and Technology, Second ed., VII, IGI Global, Hershey, PA, (2008)A system for controlled outsourcing of personal data., и . Comput. Syst. Sci. Eng., (2006)Management of access control policies for XML document sources., и . Int. J. Inf. Sec., 1 (4): 236-260 (2003)Editorial., , , , , , , , , и 2 other автор(ы). IEEE Trans. Serv. Comput., 11 (1): 1-4 (2018)A System for Timely and Controlled Information Sharing in Emergency Situations., , и . IEEE Trans. Dependable Secur. Comput., 10 (3): 129-142 (2013)Risk Assessment in Social Networks Based on User Anomalous Behaviors., , и . IEEE Trans. Dependable Secur. Comput., 15 (2): 295-308 (2018)A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks., , , и . CODASPY, стр. 51-62. ACM, (2011)Access control for XML documents and data., , и . Inf. Secur. Tech. Rep., 9 (3): 19-34 (2004)Cyber Pandemics., и . IEEE Internet Comput., 27 (2): 5-6 (марта 2023)A framework to enforce access control over data streams., , , и . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)