From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing the Computation of Overriding., , и . ISWC (1), том 9366 из Lecture Notes in Computer Science, стр. 356-372. Springer, (2015)Protune: A Framework for Semantic Web Policies., , , и . ISWC (Posters & Demos), том 401 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)A Uniform Framework for Regulating Service Access and Information Release on the Web., и . J. Comput. Secur., 10 (3): 241-272 (2002)Event-driven RBAC., , и . J. Comput. Secur., 23 (6): 709-757 (2015)TRBAC: a temporal role-based access control model., , и . ACM Workshop on Role-Based Access Control, стр. 21-30. ACM, (2000)Generalized Agent-mediated Procurement Auctions., , , и . AAMAS, стр. 77-85. ACM, (2016)Abduction over Unbounded Domains via ASP.. ECAI, стр. 288-292. IOS Press, (2004)Some Complexity Results on Fuzzy Description Logics., и . WILF, том 2955 из Lecture Notes in Computer Science, стр. 19-24. Springer, (2003)ERBAC: event-driven RBAC., , и . SACMAT, стр. 125-136. ACM, (2013)Prototypes for Reasoning with Infinite Stable Models and Function Symbols.. LPNMR, том 2173 из Lecture Notes in Computer Science, стр. 416-419. Springer, (2001)