From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Models, Geospatial., и . Encyclopedia of GIS, Springer, (2008)Panel on role engineering.. SACMAT, стр. 61-62. ACM, (2008)Panel on granularity in access control., , , , , и . SACMAT, стр. 85-86. ACM, (2013)Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery., , , и . PAKDD, том 4426 из Lecture Notes in Computer Science, стр. 71-83. Springer, (2007)UICDS compliant resource management system for emergency response., , , и . DG.O, стр. 23-31. Digital Government Research Center, (2010)Preface.. J. Comput. Secur., 19 (3): 365 (2011)Geospatial Authorizations, Efficient Enforcement., и . Encyclopedia of GIS, Springer, (2008)A meta model for access control: why is it needed and is it even possible to achieve?, и . SACMAT, стр. 153-154. ACM, (2008)Challenges in eGovernment technology transfer., , , и . DG.O, том 151 из ACM International Conference Proceeding Series, стр. 151-152. Digital Government Research Center, (2006)EDI Through A Distributed Information Systems Approach., , , и . HICSS (7), стр. 354-365. IEEE Computer Society, (1998)