From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk Aware Query Replacement Approach for Secure Databases Performance Management., и . IEEE Trans. Dependable Secur. Comput., 12 (2): 217-229 (2015)An authorization model for multimedia digital libraries., , и . Int. J. Digit. Libr., 4 (3): 139-155 (2004)The Inference Problem: A Survey., и . SIGKDD Explor., 4 (2): 6-11 (2002)Unauthorized inferences in semistructured databases., , и . Inf. Sci., 176 (22): 3269-3299 (2006)Accurate Accident Reconstruction in VANET., , и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 271-279. Springer, (2011)uSMIL: Towards secure unbreakable semantics in multimedia web services., , и . Comput. Syst. Sci. Eng., (2006)Multimedia Access Control Using RDF Metadata., , и . OTM Workshops, том 2889 из Lecture Notes in Computer Science, стр. 718-731. Springer, (2003)Web Service constraint optimization., и . ICITST, стр. 270-275. IEEE, (2013)From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)., , , и . IICIS, том 193 из IFIP, стр. 41-55. Springer, (2004)The cost of increased transactional correctness and durability in distributed databases., и . IRI, стр. 441-448. IEEE, (2012)