From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Indexing Techniques for Queries on Nested Objects., и . IEEE Trans. Knowl. Data Eng., 1 (2): 196-214 (1989)Systematic clustering method for l-diversity model., , , и . ADC, том 104 из CRPIT, стр. 93-102. Australian Computer Society, (2010)A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems., , и . ACM Workshop on Role-Based Access Control, стр. 1-12. ACM, (1997)Object-Oriented Databases., и . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Learning information release policies for preventing intersection attacks., , и . MILCOM, стр. 794-799. IEEE, (2017)Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation., и . DEXA, стр. 500-507. Springer, (1990)Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application., , , , и . Communications and Multimedia Security, том 175 из IFIP, стр. 159-171. Springer, (2004)Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records., , , и . ACM Trans. Priv. Secur., 22 (3): 15:1-15:36 (2019)On Using Materialization Strategies for a Temporal Authorization Model., , , , и . VIEWS, стр. 34-42. (1996)Generic Methods in Deductive Object Databases., , и . OOIS, стр. 210-213. Springer, (1994)