From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A propositional policy algebra for access control., и . ACM Trans. Inf. Syst. Secur., 6 (2): 286-325 (2003)A Flexible Authorization Mechanism for Relational Data Management Systems., , и . ACM Trans. Inf. Syst., 17 (2): 101-140 (1999)An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads., и . ACM Conference on Computer and Communications Security, стр. 118-125. ACM, (1994)A framework for establishing, assessing, and managing trust in inter-organizational relationships., , , и . SWS, стр. 23-32. ACM, (2006)Trusted Recovery., , и . Commun. ACM, 42 (7): 71-75 (1999)Maintaining privacy on derived objects., , , и . WPES, стр. 10-19. ACM, (2005)Scalable Group Rekeying for Secure Multicast: A Survey., и . IWDC, том 2918 из Lecture Notes in Computer Science, стр. 1-10. Springer, (2003)Encryption and Fragmentation for Data Confidentiality in the Cloud., , , , , и . FOSAD, том 8604 из Lecture Notes in Computer Science, стр. 212-243. Springer, (2013)Recoverable Encryption through Noised Secret over a Large Cloud., , и . Globe, том 7450 из Lecture Notes in Computer Science, стр. 13-24. Springer, (2012)Anonymity and Historical-Anonymity in Location-Based Services., , , , и . Privacy in Location-Based Applications, том 5599 из Lecture Notes in Computer Science, стр. 1-30. Springer, (2009)