From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A metadata-based access control model for web services., , и . Internet Res., 15 (1): 99-116 (2005)A trust negotiation based security framework for service provisioning in load-balancing clusters., , и . Comput. Secur., 31 (1): 4-25 (2012)Towards Precise Security Patterns., , и . DEXA Workshops, стр. 287-291. IEEE Computer Society, (2008)Editorial., , , , и . J. Syst. Archit., 57 (3): 229-230 (2011)Towards Formal Specification of Abstract Security Properties., и . ARES, стр. 80-87. IEEE Computer Society, (2008)Entity Lifecycle Management for OKKAM., , , и . IRSW, том 422 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Interoperable semantic access control for highly dynamic coalitions., и . Secur. Commun. Networks, 3 (6): 565-594 (2010)Improving Security Assurance of Services through Certificate Profiles., , и . ESOCC Workshops, том 393 из Communications in Computer and Information Science, стр. 288-302. Springer, (2013)Validation of a Security Metamodel for the Development of Cloud Applications., , , и . OCL@MoDELS, том 1285 из CEUR Workshop Proceedings, стр. 33-42. CEUR-WS.org, (2014)Facilitating the Use of TPM Technologies through S&D Patterns., , , и . DEXA Workshops, стр. 765-769. IEEE Computer Society, (2007)