Author of the publication

Minimum cost rule enforcement for cooperative database access.

, , , and . J. Comput. Secur., 24 (3): 379-403 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information., , and . Int. J. Artif. Intell. Tools, 7 (2): 319-339 (1998)Computer Security, Fault Tolerance, And Software Assurance., and . IEEE Concurr., 7 (1): 4-6 (1999)Efficient security mechanisms for overlay multicast based content delivery., , , , and . Comput. Commun., 30 (4): 793-806 (2007)A Consensus Glossary of Temporal Database Concepts., , , , , and . SIGMOD Rec., 23 (1): 52-64 (1994)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , and . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., and . ESORICS, volume 648 of Lecture Notes in Computer Science, page 307-328. Springer, (1992)Recoverable Encryption through a Noised Secret over a Large Cloud., , and . Trans. Large Scale Data Knowl. Centered Syst., (2013)Globally Consistent Event Ordering in One-Directional Distributed Environments., , and . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , and . CoRR, (2020)Managing attack graph complexity through visual hierarchical aggregation., and . VizSEC, page 109-118. ACM, (2004)