From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Data Bases under Linear Queries., , и . IFIP Congress, стр. 395-398. (1977)Cyber Security as an Emergent Infrastructure.. World Conference on Information Security Education, том 253 из IFIP Conference Proceedings, стр. 1-2. Kluwer, (2003)Certification of Programs for Secure Information Flow., и . Commun. ACM, 20 (7): 504-513 (1977)An Intrusion-Detection Model. IEEE Transactions on Software Engineering, SE-13 (2): 222--232 (февраля 1987)Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.. S&P, стр. 134-146. IEEE Computer Society, (1985)The SeaView security model., , , , и . S&P, стр. 218-233. IEEE Computer Society, (1988)A Security Model for the Statistical Database Problem.. SSDBM, стр. 368-390. Lawrence Berkeley Laboratory, (1983)The Dark Web Forum Portal: From multi-lingual to video., , , , , и . ISI, стр. 7-14. IEEE, (2011)To Tap or not to Tap., , , , , , , , и . Commun. ACM, 36 (3): 24-44 (1993)Secure statistical databases with random sample queries. ACM Trans. Database Syst., 5 (3): 291--315 (сентября 1980)