From post

Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.

, , и . Secure Internet Programming, том 1603 из Lecture Notes in Computer Science, стр. 35-49. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A System Architecture for Software Fault Tolerance., , , , и . Fehlertolerierende Rechensysteme, том 147 из Informatik-Fachberichte, стр. 273-283. Springer, (1987)Context and location aware textual data input., , и . SAC, стр. 425-428. ACM, (2001)AOP for software evolution: a design oriented approach., , и . SAC, стр. 1346-1350. ACM, (2005)Agents and Ontologies for Understanding and Preserving the Rock Art of Mount Bego., , , , , и . ICAART (2), стр. 288-295. SciTePress, (2011)Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks., , и . Secure Internet Programming, том 1603 из Lecture Notes in Computer Science, стр. 35-49. Springer, (1999)Structured Graph Models: An Efficient Tool for VLSI Desgin., , , , и . Great Lakes Computer Science Conference, том 507 из Lecture Notes in Computer Science, стр. 307-312. Springer, (1989)Design-Based Pointcuts Robustness Against Software Evolution., , и . RAM-SE, стр. 35-45. Fakultät für Informatik, Universität Magdeburg, (2006)Path Problems in Structured Graphs., , и . Comput. J., 29 (6): 553-563 (1986)Cross Software Development for Microprocessors Using a Translator Writing System., , и . ICSE, стр. 399-402. IEEE Computer Society, (1979)Mobile Computing in Outdoor Environments (Extended Abstract)., , и . SAC, стр. 413-415. ACM, (1999)