From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A framework for security assurance of access control enforcement code., , и . Comput. Secur., 29 (7): 770-784 (2010)A framework of composable access control features: Preserving separation of access control concerns from models to code., , и . Comput. Secur., 29 (3): 350-379 (2010)Safety and Liveness for an RBAC/MAC Security Model., , и . DBSec, том 142 из IFIP, стр. 316-329. Kluwer/Springer, (2003)Role Delegation for a Resource-Based Security Model., , , , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 37-48. Kluwer, (2002)Analysis of Heterogeneous Data in Ultrahigh Dimensions., , , , и . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)Design Analysis and Performance Evaluation Methodologies for Database Computers., , и . Advances in Computers, (1986)Implementing a Culling and Self-Intersection Algorithm for Stereolithography Files in Ada 95., , , и . SIGAda, стр. 104-113. ACM, (1998)A Reusability Measurement Framework and Tool for Ada 95., , и . TRI-Ada, стр. 125-132. ACM, (1997)Role-Based Security in a Distributed Resource Environment., , , , , и . DBSec, том 201 из IFIP Conference Proceedings, стр. 259-270. Kluwer, (2000)Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC., , , , и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 293-300. Springer, (2011)