From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multilevel Security Transaction Processing., , , , и . J. Comput. Secur., 9 (3): 165-195 (2001)Autonomy and Confidentiality: Secure Federated Data Management., , , , и . NGITS, (1995)Application-Level Isolation Using Data Inconsistency Detection., , и . ACSAC, стр. 119-126. IEEE Computer Society, (1999)Beyond the Pale of MAC and DAC-Defining New Forms of Access Control., , и . S&P, стр. 190-200. IEEE Computer Society, (1990)Benchmarking multilevel secure database systems using the MITRE benchmark., , , и . ACSAC, стр. 86-95. IEEE, (1994)Intrusion Confinement by Isolation in Information Systems, , и . Proceedings of IFIP Workshop on Database Security, (1999)Distributed Concurrency Control with Optional Data Replication., и . DBSec, том A-6 из IFIP Transactions, стр. 149-172. North-Holland, (1991)Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management., , и . J. Comput. Secur., 3 (2/3): 207-230 (1995)Application-Level Isolation to Cope with Malicious Database Users., , и . ACSAC, стр. 73-82. IEEE Computer Society, (1998)Surviving Information Warfare Attacks., , и . Computer, 32 (4): 57-63 (1999)