From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An infrastructure for managing secure update operations on XML data., , , и . SACMAT, стр. 110-122. ACM, (2003)TRBAC: a temporal role-based access control model., , и . ACM Workshop on Role-Based Access Control, стр. 21-30. ACM, (2000)Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)Un Meccanismo per il Controllo degli Accessi a Librerie Digitali., и . SEBD, стр. 179-193. (1999)A multi-layer framework for personalized social tag-based applications., , и . Data Knowl. Eng., (2012)Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET., , , и . HOTPOST@MobiHoc, стр. 7-12. ACM, (2015)Object-Oriented Database., , , , и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 207-221. Springer, (1999)Detecting anomalies in social network data consumption., , , и . Soc. Netw. Anal. Min., 4 (1): 231 (2014)Fine-Grained Access Control Within NoSQL Document-Oriented Datastores., и . Data Sci. Eng., 1 (3): 127-138 (2016)A temporal key management scheme for secure broadcasting of XML documents., , и . ACM Conference on Computer and Communications Security, стр. 31-40. ACM, (2002)