From post

A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.

, , , и . ICICS, том 3269 из Lecture Notes in Computer Science, стр. 171-186. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Model of Methods Access Authorization in Object-oriented Databases., , и . VLDB, стр. 52-61. Morgan Kaufmann, (1993)Security and Privacy Aspects in MapReduce on Clouds: A Survey., , , и . CoRR, (2016)Teaching data base systems using Date and Computing Surveys.. SIGMOD Record, 9 (1): 47-49 (1977)An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility., , , и . CSCML, том 11527 из Lecture Notes in Computer Science, стр. 156-168. Springer, (2019)Code Type Revealing Using Experiments Framework., и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 193-206. Springer, (2012)Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases., и . DBSec, том 10359 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2017)Secure Protocol of ABAC Certificates Revocation and Delegation., и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 35-50. Springer, (2017)Introduction., и . Journal of Computer Security, 19 (3): 485-486 (2011)Trust-based Dynamic RBAC., и . ICISSP, стр. 317-324. SciTePress, (2016)CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences., , , и . DASFAA (1), том 5981 из Lecture Notes in Computer Science, стр. 63-77. Springer, (2010)