From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Foreword from the Conference Chairs., , , и . NSS, IEEE, (2011)Data Security Issues in Cloud Scenarios., , и . ICISS, том 9478 из Lecture Notes in Computer Science, стр. 3-10. Springer, (2015)Enforcing Subscription-Based Authorization Policies in Cloud Scenarios., , , и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 314-329. Springer, (2012)Integrity for distributed queries., , , , , и . CNS, стр. 364-372. IEEE, (2014)Towards Flexible Credential Negotiation Protocols., , и . Security Protocols Workshop, том 3364 из Lecture Notes in Computer Science, стр. 19-23. Springer, (2003)An Algebra for Composing Access Control Policies, , и . ACM Transactions on Information and System Security (TISSEC), 5 (1): 1-35 (февраля 2002)Classifying Information for External Release., , , и . SEC, том 175 из IFIP Conference Proceedings, стр. 151-160. Kluwer, (2000)Securing XML-based Multimedia Content., и . SEC, том 250 из IFIP Conference Proceedings, стр. 61-72. Kluwer, (2003)A modular approach to composing access control policies., , и . ACM Conference on Computer and Communications Security, стр. 164-173. ACM, (2000)Assessing query privileges via safe and efficient permission composition., , , , и . ACM Conference on Computer and Communications Security, стр. 311-322. ACM, (2008)