From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AAL and Static Conflict Detection in Policy., и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 367-382. (2016)Weaving rewrite-based access control policies., , , и . FMSE, стр. 71-80. ACM, (2007)Réécriture et Modularité pour les Politiques de Sécurité. (Term Rewriting and Modularity for Security Policies).. Henri Poincaré University, Nancy, France, (2008)Simulating Algebraic Specification Genericity on Languages with Initial Semantics., и . WMF, том 95 из Electronic Notes in Theoretical Computer Science, стр. 131-148. Elsevier, (2003)Towards Accountable Services in the Cloud., и . OTM Conferences (2), том 7566 из Lecture Notes in Computer Science, стр. 470-474. Springer, (2012)Simulating Deception for Web Applications Using Reinforcement Learning., , , и . ESORICS Workshops (2), том 14399 из Lecture Notes in Computer Science, стр. 719-737. Springer, (2023)Rewrite Based Specification of Access Control Policies., , и . SecReT@LICS/CSF, том 234 из Electronic Notes in Theoretical Computer Science, стр. 37-54. Elsevier, (2008)Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data., , , и . SEC, том 562 из IFIP Advances in Information and Communication Technology, стр. 151-164. Springer, (2019)DLoc: Distributed Auditing for Data Location Compliance in Cloud., , и . DPM/CBT@ESORICS, том 10436 из Lecture Notes in Computer Science, стр. 202-218. Springer, (2017)ROCK Algorithm Parallelization with TOREADOR Primitives., , , , и . AINA Workshops, стр. 402-407. IEEE Computer Society, (2018)