From post

Controlling Data Flow with a Policy-Based Programming Language for the Web.

, , и . NordSec, том 8208 из Lecture Notes in Computer Science, стр. 215-230. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Flexible and Distributed Architecture to Enforce Dynamic Access Control., , и . SEC, том 201 из IFIP, стр. 183-195. Springer, (2006)Substructural Meta-Theory of a Type-Safe Language for Web Programming., и . Fundam. Informaticae, 130 (1): 67-97 (2014)Selecting Appropriate Counter-Measures in an Intrusion Detection Framework., , и . CSFW, стр. 78-87. IEEE Computer Society, (2004)QWeS2T for Type-Safe Web Programming., и . LAM@LICS, том 7 из EPiC Series in Computing, стр. 96-112. EasyChair, (2010)Controlling Data Flow with a Policy-Based Programming Language for the Web., , и . NordSec, том 8208 из Lecture Notes in Computer Science, стр. 215-230. Springer, (2013)Nomad: A Security Model with Non Atomic Actions and Deadlines., , и . CSFW, стр. 186-196. IEEE Computer Society, (2005)OPA: Onion Policy Administration Model - Another approach to manage rights in DRM., , и . SEC, том 232 из IFIP, стр. 349-360. Springer, (2007)FORM : A Federated Rights Expression Model for Open DRM Frameworks., , и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 45-59. Springer, (2006)Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework., , , , , и . Ann. des Télécommunications, 61 (1-2): 197-217 (2006)Getting CS undergraduates to communicate effectively., , , , , , и . ITiCSE, стр. 283-287. ACM, (2011)