From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Unified Framework for Enforcing Multiple Access Control Policies., , , и . SIGMOD Conference, стр. 474-485. ACM Press, (1997)Threat Modeling for Cloud Data Center Infrastructures., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 302-319. Springer, (2016)Distributed Query Evaluation over Encrypted Data., , , , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 96-114. Springer, (2021)Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , и . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)Regulating Exceptions in Healthcare Using Policy Spaces., , , , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 254-267. Springer, (2008)Cooperative Data Access in Multi-cloud Environments., , и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 14-28. Springer, (2011)Data Mining for Intrusion Detection., и . Data Mining and Knowledge Discovery Handbook, Springer, (2010)Assessing query privileges via safe and efficient permission composition., , , , и . ACM Conference on Computer and Communications Security, стр. 311-322. ACM, (2008)MTD 2014: First ACM Workshop on Moving Target Defense., и . ACM Conference on Computer and Communications Security, стр. 1550-1551. ACM, (2014)