From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Typing for Conflict Detection in Access Control Policies., , , , и . MCETECH, том 26 из Lecture Notes in Business Information Processing, стр. 212-226. Springer, (2009)An Introduction to LOTOS: Learning by Examples., , и . Computer Networks and ISDN Systems, 23 (5): 325-342 (1992)Corrigendum: Computer Networks and ISDN Systems 25(1): 99-100 (1992).Immaturity and Potential of Formal Methods: A Personal View.. FIW, стр. 9-13. IOS Press, (2000)Feature Interaction Filtering with Use Case Maps at Requirements Stage., , , и . FIW, стр. 163-178. IOS Press, (2000)Derivation of Useful Execution Trees from LOTOS by using an Interpreter., и . FORTE, стр. 311-325. North-Holland, (1988)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , и . FORTE, том 43 из IFIP Conference Proceedings, стр. 57-72. Chapman & Hall, (1995)A Metamodel for Hybrid Access Control Policies., , и . J. Softw., 10 (7): 784-797 (2015)Specifying telephone systems in LOTOS., и . IEEE Commun. Mag., 31 (8): 38-45 (1993)Dynamic risk-based decision methods for access control systems., , и . Comput. Secur., 31 (4): 447-464 (2012)Configuring Data Flows in the Internet of Things for Security and Privacy Requirements., и . FPS, том 11358 из Lecture Notes in Computer Science, стр. 115-130. Springer, (2018)