From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach, , и . Advances in Information Security Springer, (2003)Database Security: Current Status and Key Issues., и . SIGMOD Record, 19 (4): 123-126 (1990)A User Friendly Guard with Mobile Post-Release Access Control Policy., , , и . SEC, том 250 из IFIP Conference Proceedings, стр. 265-276. Kluwer, (2003)Towards Secure XML Federations., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 117-131. Kluwer, (2002)Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases., , и . DBSec, том A-6 из IFIP Transactions, стр. 297-314. North-Holland, (1991)Recent Advances in Access Control Models., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 3-15. Kluwer, (2001)Mining Malicious Corruption of Data with Hidden Markov Models., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 175-189. Kluwer, (2002)LHAP: A lightweight network access control protocol for ad hoc networks., , , и . Ad Hoc Networks, 4 (5): 567-585 (2006)A View-Based Dynamic Replication Control Algorithm., , и . Nord. J. Comput., 1 (2): 214-230 (1994)A short technical paper: Determining whether a vote assignment is dominated., и . Inf. Sci., 56 (1-3): 279-282 (1991)