From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A practical application of our MDD approach for modeling secure XML data warehouses., , , и . Decis. Support Syst., 52 (4): 899-925 (2012)Secure business process model specification through a UML 2.0 activity diagram profile., , , и . Decis. Support Syst., 51 (3): 446-465 (2011)Main Issues in Big Data Security., , и . Future Internet, 8 (3): 44 (2016)Model driven development of secure XML databases., , , и . SIGMOD Rec., 35 (3): 22-27 (2006)Applying a Security Requirements Engineering Process., , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2006)Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 51-61. Springer, (2006)Security requirements engineering framework for software product lines., , и . Inf. Softw. Technol., 52 (10): 1094-1117 (2010)Gestión Integral de Requisitos de Seguridad en Líneas de Producto Software., , и . JISBD, стр. 177-186. Thomson Editorial, (2007)Towards a Process for Web Services Security., , и . J. Res. Pract. Inf. Technol., (2006)A BPMN Extension for the Modeling of Security Requirements in Business Processes., , и . IEICE Trans. Inf. Syst., 90-D (4): 745-752 (2007)