From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A framework for verification and optimal reconfiguration of event-driven role based access control policies., , , и . SACMAT, стр. 197-208. ACM, (2012)Teaching privacy in an interactive fashion., , , , и . InfoSecCD, стр. 7:1-7:7. ACM, (2014)Utilizing social media to improve local government responsiveness., , , , , , , , и . DG.O, стр. 236-244. ACM, (2014)Blockchain Based Auditable Access Control for Distributed Business Processes., , , , , и . ICDCS, стр. 12-22. IEEE, (2020)Provision of Multimedia Services in a Mobile Ad Hoc Network., , , и . WORDS Fall, стр. 87-93. IEEE Computer Society, (2003)Community based emergency response., , , , , , и . DG.O, стр. 82-91. ACM, (2013)ASSEMBLE: a collaborative business process development tool., , , , , , , и . ICSE (Companion Volume), стр. 376-377. ACM, (2018)Discovering Events from Social Media for Emergency Planning., , , , и . DG.O, стр. 109-116. ACM, (2019)A Framework for Policy Similarity Evaluation and Migration Based on Change Detection., , , и . NSS, том 9408 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2015)Dependencies and separation of duty constraints in GTRBAC., , , и . SACMAT, стр. 51-64. ACM, (2003)