From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Flexible Architecture for Security Policy Enforcement., и . DISCEX (2), стр. 234-239. IEEE Computer Society, (2003)Object data models to support source code queries: implementing SCA within REFINE., и . WPC, стр. 145-152. IEEE, (1994)Design Considerations in Choosing Operations for Building Groupware Systems., и . CSCW Tools and Technologies Workshop, стр. 9. ACM, (1992)ACM SIGOIS Bulletin 13(4), April 1993.Undoing Actions in Collaborative Work., и . CSCW, стр. 273-280. ACM, (1992)Ensuring Authorized Updates in Multi-user Database-Backed Applications., , и . USENIX Security Symposium, стр. 1445-1462. USENIX Association, (2017)ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms., , , , , , и . NDSS, The Internet Society, (2017)Data Management Issues and Trade-Offs in CSCW Systems., , и . IEEE Trans. Knowl. Data Eng., 11 (1): 213-227 (1999)Building Systems that Flexibly Control Downloaded Executable Content, , и . #SEC96#, (1996)The Case for Better Throughput Estimation., , и . Workshop on Hot Topics in Operating Systems, стр. 70-75. IEEE Computer Society, (1999)Distilling critical attack graph surface iteratively through minimum-cost SAT solving., , , , и . ACSAC, стр. 31-40. ACM, (2011)