From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms., , , и . MOBILWARE, том 48 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 161-174. Springer, (2010)PBDM: a flexible delegation model in RBAC., , и . SACMAT, стр. 149-157. ACM, (2003)A general obligation model and continuity: enhanced policy enforcement engine for usage control., , , , и . SACMAT, стр. 123-132. ACM, (2008)Exploitation and threat analysis of open mobile devices., , , и . ANCS, стр. 20-29. ACM, (2009)After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud., , и . AsiaCCS, стр. 317-328. ACM, (2014)SecureBus: towards application-transparent trusted computing with mandatory access control., , , и . AsiaCCS, стр. 117-126. ACM, (2007)A Trusted Mobile Phone Prototype., , , и . CCNC, стр. 1208-1209. IEEE, (2008)Towards System Integrity Protection with Graph-Based Policy Analysis., , и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 65-80. Springer, (2009)Protecting access privacy of cached contents in information centric networks., , , , и . AsiaCCS, стр. 173-178. ACM, (2013)Towards Session-Aware RBAC Administration and Enforcement with XACML., , , и . POLICY, стр. 9-16. IEEE Computer Society, (2009)