From post

A Role-Involved Conditional Purpose-Based Access Control Model.

, , и . EGES/GISP, том 334 из IFIP Advances in Information and Communication Technology, стр. 167-180. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Leakage-free Authentication of Trees, Graphs and Forests., , и . IACR Cryptology ePrint Archive, (2012)Trust-X: A Peer-to-Peer Framework for Trust Establishment., , и . IEEE Trans. Knowl. Data Eng., 16 (7): 827-842 (2004)Systematic clustering method for l-diversity model., , , и . ADC, том 104 из CRPIT, стр. 93-102. Australian Computer Society, (2010)T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management., , , и . Inf. Syst., 28 (8): 885-927 (2003)Indexing Techniques for Queries on Nested Objects., и . IEEE Trans. Knowl. Data Eng., 1 (2): 196-214 (1989)Learning information release policies for preventing intersection attacks., , и . MILCOM, стр. 794-799. IEEE, (2017)Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation., и . DEXA, стр. 500-507. Springer, (1990)Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application., , , , и . Communications and Multimedia Security, том 175 из IFIP, стр. 159-171. Springer, (2004)Securing Named Data Networks: Challenges and the Way Forward., и . SACMAT, стр. 51-59. ACM, (2018)A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System., и . CODASPY, стр. 256-266. ACM, (2018)