From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SecureFlow: A Secure Web-Enabled Workflow Management System., и . ACM Workshop on Role-Based Access Control, стр. 83-94. ACM, (1999)Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems., , , , и . IEEE Trans. Emerg. Top. Comput., 9 (4): 1901-1913 (2021)Editors' message for the special issue on security., и . Int. J. Digit. Libr., 4 (3): 137-138 (2004)A Content-Based Authorization Model for Digital Libraries., , , и . IEEE Trans. Knowl. Data Eng., 14 (2): 296-315 (2002)Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases., , и . IEEE Trans. Knowl. Data Eng., 8 (5): 839-854 (1996)Random Walks to Identify Anomalous Free-Form Spatial Scan Windows., и . IEEE Trans. Knowl. Data Eng., 20 (10): 1378-1392 (2008)Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization., , , , , , и . ACM Trans. Manag. Inf. Syst., 11 (2): 7:1-7:33 (2020)On Optimal Employee Assignment in Constrained Role-Based Access Control Systems., , , , и . ACM Trans. Manag. Inf. Syst., 7 (4): 10:1-10:24 (2017)AMTRAC: An administrative model for temporal role-based access control., , , и . Comput. Secur., (2013)Towards designing robust CAPTCHAs., , , , и . J. Comput. Secur., 26 (6): 731-760 (2018)