From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security of Data and Transaction Processing - Guest Editor's Introduction., и . Distributed Parallel Databases, 8 (1): 5-6 (2000)Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols., , и . DBSec, том A-60 из IFIP Transactions, стр. 259-274. North-Holland, (1994)Multilevel Secure Transaction Processing: Status and Prospects., , , , и . DBSec, том 79 из IFIP Conference Proceedings, стр. 79-98. Chapman & Hall, (1996)An Extended Transaction Model Approach for Multilevel Secure Transaction Processing., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 255-268. Kluwer, (2001)SecureFlow: A Secure Web-Enabled Workflow Management System., и . ACM Workshop on Role-Based Access Control, стр. 83-94. ACM, (1999)Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)An authorization model for temporal and derived data: securing information portals., и . ACM Trans. Inf. Syst. Secur., 5 (1): 62-94 (2002)Editors' message for the special issue on security., и . Int. J. Digit. Libr., 4 (3): 137-138 (2004)Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems., , , , и . IEEE Trans. Emerg. Top. Comput., 9 (4): 1901-1913 (2021)Security analysis of ABAC under an administrative model., , , и . IET Inf. Secur., 13 (2): 96-103 (2019)