From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Maintaining privacy on derived objects., , , и . WPES, стр. 10-19. ACM, (2005)A Flexible Authorization Mechanism for Relational Data Management Systems., , и . ACM Trans. Inf. Syst., 17 (2): 101-140 (1999)A framework for establishing, assessing, and managing trust in inter-organizational relationships., , , и . SWS, стр. 23-32. ACM, (2006)A propositional policy algebra for access control., и . ACM Trans. Inf. Syst. Secur., 6 (2): 286-325 (2003)Trusted Recovery., , и . Commun. ACM, 42 (7): 71-75 (1999)An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads., и . ACM Conference on Computer and Communications Security, стр. 118-125. ACM, (1994)Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information., , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 431-445. Springer, (1994)Satisfiability of Quantitative Temporal Constraints with Multiple Granularities., , и . CP, том 1330 из Lecture Notes in Computer Science, стр. 435-449. Springer, (1997)Extending Loose Associations to Multiple Fragments., , , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)Scalable Group Rekeying for Secure Multicast: A Survey., и . IWDC, том 2918 из Lecture Notes in Computer Science, стр. 1-10. Springer, (2003)