From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scheduling as a Graph Transformation., и . IBM J. Res. Dev., 20 (6): 551-559 (1976)Using Security Patterns to Develop Secure Systems - Ten Years Later., , и . Int. J. Syst. Softw. Secur. Prot., 9 (4): 46-57 (2018)CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development., , , , , , , , , и 1 other автор(ы). Int. J. Syst. Softw. Secur. Prot., 12 (2): 68-85 (2021)Enterprise security pattern: A model-driven architecture instance., , , и . Comput. Stand. Interfaces, 36 (4): 748-758 (2014)A System Architecture for Fault Tolerance in Concurrent Software., , , , и . Computer, 23 (10): 23-32 (1990)A Simplification of a Conversation Design Scheme Using Petri Nets., и . IEEE Trans. Software Eng., 15 (5): 658-660 (1989)Abstract Entity Patterns for Sensors and Actuators., , , и . Comput., 12 (5): 93 (2023)Secure and efficient key management in mobile ad hoc networks., , , , и . J. Netw. Comput. Appl., 30 (3): 937-954 (2007)Data Base Security: Requirements, Policies, and Models., , и . IBM Syst. J., 19 (2): 229-252 (1980)A Method-Based Authorization Model for Object-Oriented Databases., , и . Security for Object-Oriented Systems, стр. 135-150. Springer, (1993)