From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conceptual Framework and Architecture for Privacy Audit., , , , , и . APF, том 8319 из Lecture Notes in Computer Science, стр. 17-40. Springer, (2012)Securing XML Documents with Author-X., , и . IEEE Internet Comput., 5 (3): 21-31 (2001)Privacy-Aware Collaborative Access Control in Web-Based Social Networks., и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 81-96. Springer, (2008)Detection of Unspecified Emergencies for Controlled Information Sharing., , и . IEEE Trans. Dependable Secur. Comput., 13 (6): 630-643 (2016)Enforcing Obligations within RelationalDatabase Management Systems., и . IEEE Trans. Dependable Secur. Comput., 11 (4): 318-331 (2014)Object-Oriented Database., , , , и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 207-221. Springer, (1999)Fine-Grained Access Control Within NoSQL Document-Oriented Datastores., и . Data Sci. Eng., 1 (3): 127-138 (2016)Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET., , , и . HOTPOST@MobiHoc, стр. 7-12. ACM, (2015)Detecting anomalies in social network data consumption., , , и . Soc. Netw. Anal. Min., 4 (1): 231 (2014)A temporal key management scheme for secure broadcasting of XML documents., , и . ACM Conference on Computer and Communications Security, стр. 31-40. ACM, (2002)