From post

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.

, , , , и . WEBIST (Revised Selected Papers), том 372 из Lecture Notes in Business Information Processing, стр. 78-98. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing Access Control Performance for the Cloud., , , и . CLOSER, стр. 551-558. SciTePress, (2014)Re-Identification Risk Based Security Controls., и . OTM Workshops, том 8842 из Lecture Notes in Computer Science, стр. 99-107. Springer, (2014)A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement., , , , и . WEBIST (Revised Selected Papers), том 372 из Lecture Notes in Business Information Processing, стр. 78-98. Springer, (2018)DULP Perspectives in a Learning Management System., , и . ICALT, стр. 728-729. IEEE Computer Society, (2010)Declarative Access Control for Aggregations of Multiple Ownership Data., , и . SACMAT, стр. 59-70. ACM, (2020)Tools for Supporting Hybrid Learning Strategies in Open Source Software Environments., , , и . ICHL, том 5169 из Lecture Notes in Computer Science, стр. 328-337. Springer, (2008)Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud., , , , , , , и . CSCloud/EdgeCom, стр. 74-80. IEEE, (2019)Towards Security Certification Schemas for the Internet of Services., , , и . NTMS, стр. 1-5. IEEE, (2012)A tool to support the introduction of GNU/Linux desktop system in a professional environment., , , , , и . OSS, том 203 из IFIP, стр. 253-260. Springer, (2006)A proposal for interactive-constructivistic teaching methods supported by Web 2.0 technologies and environments., и . DEXA Workshops, стр. 648-652. IEEE Computer Society, (2007)