Author of the publication

UICDS compliant resource management system for emergency response.

, , , and . DG.O, page 23-31. Digital Government Research Center, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Models, Geospatial., and . Encyclopedia of GIS, Springer, (2008)Panel on granularity in access control., , , , , and . SACMAT, page 85-86. ACM, (2013)Panel on role engineering.. SACMAT, page 61-62. ACM, (2008)Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery., , , and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 71-83. Springer, (2007)Geospatial Authorizations, Efficient Enforcement., and . Encyclopedia of GIS, Springer, (2008)UICDS compliant resource management system for emergency response., , , and . DG.O, page 23-31. Digital Government Research Center, (2010)Preface.. J. Comput. Secur., 19 (3): 365 (2011)A meta model for access control: why is it needed and is it even possible to achieve?, and . SACMAT, page 153-154. ACM, (2008)Preserving Privacy in Social Networks: A Structure-Aware Approach., , , , and . Web Intelligence, page 647-654. IEEE Computer Society, (2009)EDI Through A Distributed Information Systems Approach., , , and . HICSS (7), page 354-365. IEEE Computer Society, (1998)