From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

UICDS compliant resource management system for emergency response., , , и . DG.O, стр. 23-31. Digital Government Research Center, (2010)Enhancing the government service experience through QR codes on mobile platforms., , , , и . Gov. Inf. Q., 31 (1): 6-16 (2014)Structure-aware graph anonymization., , , , и . Web Intell. Agent Syst., 10 (2): 193-208 (2012)Optimal Employee Recruitment in Organizations under Attribute-Based Access Control., , , , и . ACM Trans. Manag. Inf. Syst., 12 (1): 6:1-6:24 (2021)Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control., , , и . IEEE Trans. Inf. Forensics Secur., 13 (4): 897-911 (2018)Security analysis of temporal RBAC under an administrative model., , , и . Comput. Secur., (2014)Privacy-preserving link discovery., , , и . SAC, стр. 909-915. ACM, (2008)Privacy-Preserving Decision Trees over Vertically Partitioned Data., и . DBSec, том 3654 из Lecture Notes in Computer Science, стр. 139-152. Springer, (2005)Vertically Partitioned Data.. Encyclopedia of Database Systems, Springer US, (2009)Automating Security Configuration and Administration: An Access Control Perspective.. IWSEC, том 6434 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2010)