From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Modelling of Data Integration Systems Security Policies., , , , и . Data Sci. Eng., 1 (3): 139-148 (2016)An Access-Control Framework for WS-BPEL., , и . Int. J. Web Serv. Res., 5 (3): 20-43 (2008)Group-Based Negotiations in P2P Systems., , , , и . IEEE Trans. Parallel Distributed Syst., 21 (10): 1473-1486 (2010)Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , и . ESEM, стр. 24:1-24:8. ACM, (2014)Security for Web Services and Service-Oriented Architectures., , , и . Springer, (2010)Access control in Internet-of-Things: A survey., , , и . J. Netw. Comput. Appl., (2019)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , и . REFSQ, том 9013 из Lecture Notes in Computer Science, стр. 98-114. Springer, (2015)Collective privacy management in social networks., , и . WWW, стр. 521-530. ACM, (2009)Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain., , , , и . EmpiRE, стр. 49-56. IEEE Computer Society, (2012)An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , и . EmpiRE, стр. 28-35. IEEE Computer Society, (2014)