From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data protection models for service provisioning in the cloud., и . SACMAT, стр. 183-192. ACM, (2010)Toward Automated Multiparty Privacy Conflict Detection., , и . CIKM, стр. 1811-1814. ACM, (2018)A Unified Theory of Trust and Collaboration., и . CollaborateCom, том 10 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 425-438. Springer / ICST, (2008)Privacy policies compliance across digital identity management systems., , и . SPRINGL, стр. 72-81. ACM, (2008)Web-Traveler Policies for Images on Social Networks., и . World Wide Web, 12 (4): 461-484 (2009)Ws-AC: A Fine Grained Access Control System for Web Services., , , и . World Wide Web, 9 (2): 143-171 (2006)A Flexible Access Control Model for Web Services., и . FQAS, том 3055 из Lecture Notes in Computer Science, стр. 13-16. Springer, (2004)Incentivizing Distributive Fairness for Crowdsourcing Workers., , и . AAMAS, стр. 404-412. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Trust-Chi: An XML Framework for Trust Negotiations., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 146-157. Springer, (2003)XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks., и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 223-238. Springer, (2012)