From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transparent And-Parallelism in the Presence of Shared Free Variables., и . ICLP/SLP, стр. 749-764. MIT Press, (1988)Role-based trust management security policy analysis and correction environment (RT-SPACE)., , и . ICSE Companion, стр. 929-930. ACM, (2008)978-1-60558-079-1.Path-Dependent Reachability Analysis for Multiple Specialization.. NACLP, стр. 133-153. MIT Press, (1989)Implementation and Performance Analysis of the Role-Based Trust Management System, RTC., и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 184-199. Springer, (2010)Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)., , и . ICICS, том 4307 из Lecture Notes in Computer Science, стр. 159-173. Springer, (2006)Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems., , , и . DBSec, том 4127 из Lecture Notes in Computer Science, стр. 163-178. Springer, (2006)On the modeling and analysis of obligations., , и . CCS, стр. 134-143. ACM, (2006)Automated trust negotiation using cryptographic credentials., , и . CCS, стр. 46-57. ACM, (2005)Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule., , , , , , , и . SACMAT, стр. 3-14. ACM, (2013)Annotated Structure Shape Graphs for Abstract Analysis of Prolog., и . PLILP, том 1140 из Lecture Notes in Computer Science, стр. 92-106. Springer, (1996)