From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Collaborative Cyber Threat Intelligence for Security Management., , , и . ICISSP, стр. 339-346. SCITEPRESS, (2021)Handling Meta Attribute Information in Usage Control Policies (Short Paper)., , , , , , и . ETAA, том 13136 из Lecture Notes in Computer Science, стр. 143-151. Springer, (2021)Introduction.. Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, Springer, (2010)The BEinGRID Project.. Grid and Cloud Computing, Springer, (2010)Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry., , , и . Open Identity Summit, том P-350 из LNI, стр. 15-26. Gesellschaft für Informatik e.V., (2024)A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC., , , , , , и . Open Identity Summit, том P-335 из LNI, Gesellschaft für Informatik e.V., (2023)Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things., , , , , , , и . TrustCom, стр. 1801-1812. IEEE, (2020)A Framework for Blockchain-Based Verification of Integrity and Authenticity., , , и . IFIPTM, том 563 из IFIP Advances in Information and Communication Technology, стр. 196-208. Springer, (2019)Static and Dynamic Analysis of a Usage Control System., , , , , , , и . SACMAT, ACM, (2024)Common Capabilities for Service Oriented Infrastructures - Grid and Cloud Computing.. Grid and Cloud Computing, Springer, (2010)