From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata, , , и . (2006)Global Viewing of Heterogeneous Data Sources., , и . IEEE Trans. Knowl. Data Eng., 13 (2): 277-297 (2001)Minimal Data Upgrading to Prevent Inference and Association., , , и . PODS, стр. 114-125. ACM Press, (1999)Access control in federated systems., и . NSPW, стр. 87-99. ACM, (1996)Invited Talk - Towards Semantics-Aware Access Control., и . DBSec, том 144 из IFIP, стр. 177-188. Kluwer/Springer, (2004)15th Workshop on Privacy in the Electronic Society (WPES 2016).. ACM Conference on Computer and Communications Security, стр. 1879-1880. ACM, (2016)Access Control Models for XML., , , и . Handbook of Database Security, Springer, (2008)Supporting Concurrency in Private Data Outsourcing., , , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2011)Encryption and Fragmentation for Data Confidentiality in the Cloud., , , , , и . FOSAD, том 8604 из Lecture Notes in Computer Science, стр. 212-243. Springer, (2013)Access Control: Policies, Models, and Mechanisms., и . FOSAD, том 2171 из Lecture Notes in Computer Science, стр. 137-196. Springer, (2000)