From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Decentralised provenance for healthcare data., , , , и . Int. J. Medical Informatics, (2020)PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain., , , , , и . ITASEC, том 2058 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies., , , и . IEEE Trans. Software Eng., 45 (1): 2-33 (2019)Differentially Private Data Sharing in a Cloud Federation with Blockchain., , , и . IEEE Cloud Comput., 5 (6): 69-79 (2018)Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case., , , , и . ITASEC, том 2058 из CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Formal Approach to Specification, Analysis and Implementation of Policy-Based Systems.. University of Pisa, Italy, (2016)Riskio: A Serious Game for Cyber Security Awareness and Education., , , и . Comput. Secur., (2020)Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation - - A Practical Approach -., , , и . WS-FM, том 8379 из Lecture Notes in Computer Science, стр. 85-105. Springer, (2013)On Programming and Policing Autonomic Computing Systems., , , и . ISoLA (1), том 8802 из Lecture Notes in Computer Science, стр. 164-183. Springer, (2014)Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments., , , , , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 146-155. CEUR-WS.org, (2017)