From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Server-side Approach to Privacy Policy Matching., , , и . ARES, стр. 609-614. IEEE Computer Society, (2011)A Secure MANET Routing Protocol for Crisis Situations., , и . Int. J. Syst. Softw. Secur. Prot., 9 (4): 17-45 (2018)On the Adoption of Usage Control Technology in Collaborative Environments., и . IICS, том P-204 из LNI, стр. 142-153. GI, (2012)Federated Identity Management and Usage Control - Obstacles to Industry Adoption., и . ARES, стр. 31-41. IEEE Computer Society, (2013)Privacy in a Semantic Cloud: What's Trust Got to Do with It?, и . CloudCom, том 5931 из Lecture Notes in Computer Science, стр. 107-118. Springer, (2009)Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies., и . iNetSeC, том 7039 из Lecture Notes in Computer Science, стр. 89-103. Springer, (2011)Usage Control Enforcement - A Survey.. ARES, том 6908 из Lecture Notes in Computer Science, стр. 38-49. Springer, (2011)Design and Implementation of a CBR-based Privacy Agent., , и . ARES, стр. 317-326. IEEE Computer Society, (2012)The design of a redundant array of independent net-storages for improved confidentiality in cloud computing., , , , , и . J. Cloud Comput., (2012)Seeking Risks: Towards a Quantitative Risk Perception Measure., и . CD-ARES, том 8127 из Lecture Notes in Computer Science, стр. 256-271. Springer, (2013)