From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols., , и . DBSec, том A-60 из IFIP Transactions, стр. 259-274. North-Holland, (1994)Multilevel Secure Transaction Processing: Status and Prospects., , , , и . DBSec, том 79 из IFIP Conference Proceedings, стр. 79-98. Chapman & Hall, (1996)An Extended Transaction Model Approach for Multilevel Secure Transaction Processing., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 255-268. Kluwer, (2001)Security of Data and Transaction Processing - Guest Editor's Introduction., и . Distributed Parallel Databases, 8 (1): 5-6 (2000)Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)SecureFlow: A Secure Web-Enabled Workflow Management System., и . ACM Workshop on Role-Based Access Control, стр. 83-94. ACM, (1999)Security analysis of ABAC under an administrative model., , , и . IET Inf. Secur., 13 (2): 96-103 (2019)An authorization model for temporal and derived data: securing information portals., и . ACM Trans. Inf. Syst. Secur., 5 (1): 62-94 (2002)AMTRAC: An administrative model for temporal role-based access control., , , и . Comput. Secur., (2013)Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling., , , и . Inf. Polity, 26 (4): 375-390 (2021)