From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Administration in Distributed Service Infrastructure., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 53-70. Springer, (2010)Negotiating and delegating obligations., , и . MEDES, стр. 281-288. ACM, (2010)Building a Fair System Using Access Rights., , и . ICISS, том 10063 из Lecture Notes in Computer Science, стр. 89-108. Springer, (2016)Towards an Access-Control Metamodel for Web Content Management Systems., , , , и . ICWE Workshops, том 8295 из Lecture Notes in Computer Science, стр. 148-155. Springer, (2013)Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment., , , и . IAS, стр. 197-203. IEEE, (2010)A Service Dependency Model for Cost-Sensitive Intrusion Response., , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 626-642. Springer, (2010)Advanced Reaction Using Risk Assessment in Intrusion Detection Systems., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 58-70. Springer, (2007)Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks., , , и . ARES, стр. 157-166. IEEE Computer Society, (2016)Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks., , , , , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 524-529. Springer, (2014)FORM : A Federated Rights Expression Model for Open DRM Frameworks., , и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 45-59. Springer, (2006)