From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A component-based architecture for secure data publication, , , , и . Seventeenth Annual Computer Security Applications Conference, Institute of Electrical and Electronics Engineers (IEEE), (2001)An Access Control Model for Data Archives, , , и . стр. 261-276. Kluwer, New York, (2001)Three-Valued Semantics for Extended Logic Programs., и . GULP-PRODE, стр. 295-306. (1995)Specifying and Computing Hierarchies of Temporal Authorizations., , , и . DBSec, том 171 из IFIP Conference Proceedings, стр. 285-300. Kluwer, (1999)Defeasible Inclusions in Low-Complexity DLs., , и . J. Artif. Intell. Res., (2011)On the Decidability of Containment of Recursive Datalog Queries - Preliminary report.. PODS, стр. 297-306. ACM, (2004)Optimality and Complexity of Inference-Proof Data Filtering and CQE., , , и . ESORICS (2), том 8713 из Lecture Notes in Computer Science, стр. 165-181. Springer, (2014)Confidentiality Policies and Their Enforcement for Controlled Query Evaluation., и . ESORICS, том 2502 из Lecture Notes in Computer Science, стр. 39-54. Springer, (2002)Reasoning with Open Logic Programs.. LPNMR, том 2173 из Lecture Notes in Computer Science, стр. 147-159. Springer, (2001)Regulating service access and information release on the Web., и . ACM Conference on Computer and Communications Security, стр. 134-143. ACM, (2000)