From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The RSL99 Language for Role-Based Separation of Duty Constraints., и . ACM Workshop on Role-Based Access Control, стр. 43-54. ACM, (1999)Role-based privilege and trust management., и . Comput. Syst. Sci. Eng., (2005)A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , и . AAMAS, стр. 178-186. ACM, (2017)Certification process artifacts defined as measurable units for software assurance., , и . Softw. Process. Improv. Pract., 12 (2): 165-189 (2007)Toward Standardization of Authenticated Caller ID Transmission., , , и . IEEE Commun. Stand. Mag., 1 (3): 30-36 (2017)Efficient construction of provably secure steganography under ordinary covert channels., , , , и . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Reconstructing a formal security model., , и . Inf. Softw. Technol., 44 (11): 649-657 (2002)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , и . NDSS, The Internet Society, (2017)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , и 1 other автор(ы). NDSS, The Internet Society, (2021)Role-based access control in DCOM.. J. Syst. Archit., 46 (13): 1175-1184 (2000)