From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control Model for Grid Virtual Organizations., , , , и . ICEIS (3), стр. 152-158. (2005)dynSMAUG: A dynamic security management framework driven by situations., , , и . CSNet, стр. 1-8. IEEE, (2017)Logic-based methodology to help security architects in eliciting high-level network security requirements., , , , и . SAC, стр. 1610-1619. ACM, (2019)Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies., , , , и . SAC, стр. 1316-1318. ACM, (2018)An Adaptive XACMLv3 Policy Enforcement Point., , , и . COMPSAC Workshops, стр. 620-625. IEEE Computer Society, (2014)A deployment framework for self-contained policies., , , и . CNSM, стр. 88-95. IEEE, (2010)Implementation of a Formal Security Policy Refinement Process in WBEM Architecture., , , и . J. Netw. Syst. Manag., 15 (2): 241-266 (2007)PEP = Point to Enhance Particularly., , , и . POLICY, стр. 93-96. IEEE Computer Society, (2008)A formal framework (Expression + Analysis) for network security., , и . NCA, стр. 223-227. IEEE Computer Society, (2005)Detecting abnormal DNS traffic using unsupervised machine learning., , , и . CSNet, стр. 1-8. IEEE, (2020)