From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS., , , , и . CoRR, (2022)Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06)., и . SAC, стр. 1854. ACM, (2006)A Unified Security Framework for Networked Applications., и . SAC, стр. 351-357. ACM, (2003)Supporting multi-agent reputation calculation in the Wikipedia Recommender System.. IET Inf. Secur., 4 (4): 273-282 (2010)Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control., , и . SAC, стр. 2202-2209. ACM, (2016)A Collaborative Approach to Botnet Protection., , , , и . CD-ARES, том 7465 из Lecture Notes in Computer Science, стр. 624-638. Springer, (2012)The Claim Tool Kit for ad hoc recognition of peer entities., и . Sci. Comput. Program., 54 (1): 49-71 (2005)Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control., и . Sensors, 21 (9): 3041 (2021)ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement., , и . DSC, стр. 1-8. IEEE, (2021)Integrating Attributes into Role-Based Access Control., , и . DBSec, том 9149 из Lecture Notes in Computer Science, стр. 242-249. Springer, (2015)