From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Invited Talk - Towards Semantics-Aware Access Control., и . DBSec, том 144 из IFIP, стр. 177-188. Kluwer/Springer, (2004)A WOWA-based Aggregation Technique on Trust Values Connected to Metadata, , , и . (2006)Minimal Data Upgrading to Prevent Inference and Association., , , и . PODS, стр. 114-125. ACM Press, (1999)Access control in federated systems., и . NSPW, стр. 87-99. ACM, (1996)Global Viewing of Heterogeneous Data Sources., , и . IEEE Trans. Knowl. Data Eng., 13 (2): 277-297 (2001)Access Control Models for XML., , , и . Handbook of Database Security, Springer, (2008)15th Workshop on Privacy in the Electronic Society (WPES 2016).. ACM Conference on Computer and Communications Security, стр. 1879-1880. ACM, (2016)Privacy of Outsourced Data., и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 174-187. Springer, (2009)Machine Learning-Based, Networking and Computing Infrastructure Resource Management., , , , , , , , , и 1 other автор(ы). AIAI Workshops, том 628 из IFIP Advances in Information and Communication Technology, стр. 85-94. Springer, (2021)Securing XML Documents., , , и . EDBT, том 1777 из Lecture Notes in Computer Science, стр. 121-135. Springer, (2000)