From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Policy Chain for Securing Service Oriented Architectures., , и . DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 303-317. Springer, (2012)Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies., и . SECRYPT, стр. 386-393. INSTICC Press, (2007)LWESP: Light-Weight Exterior Sensornet Protocol., , , и . ISCC, стр. 913-919. IEEE Computer Society, (2009)Security Patterns for Capturing Encryption-Based Access Control to Sensor Data., , , и . SECURWARE, стр. 62-67. IEEE Computer Society, (2008)Access Control in Mobile and Ubiquitous Environments., , и . Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, IGI Global, (2009)Access Control in Linked Data Using WebID., и . SEMANTiCS (Posters, Demos, SuCCESS), том 1695 из CEUR Workshop Proceedings, CEUR-WS.org, (2016)