Author of the publication

A Network-Centric Design for Relationship-Based Security and Access Control.

, and . J. Comput. Secur., 5 (3): 249-254 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Respond to Dijkstra: >>On the cruelty of Really Teaching Computing Science<<. A debate on teaching computing science, page 1412--1413. ACM, (December 1989)CACM 32 (1989), Nr.~12.Clarisse's Visit at CSLI Stanford, 1991-1992.. Conversations Around Semiotic Engineering, (2017)Designing a Holistic At-Home Learning Aid for Autism., , , , , , , , , and 1 other author(s). CoRR, (2020)Interactive Workspaces., , and . Computer, 36 (4): 99-101 (2003)Superpower glass: delivering unobtrusive real-time social cues in wearable systems., , , , , , , , , and 1 other author(s). UbiComp Adjunct, page 1218-1226. ACM, (2016)Experience with KRL-0: One Cycle of a Knowledge Representation Language., and . IJCAI, page 213-222. William Kaufmann, (1977)The impact and issues of the fifth generation: Ethical issues in new computing technologies., , , and . ACM Annual Conference, page 262. ACM, (1984)Fluid interaction with high-resolution wall-size displays., , and . UIST, page 21-30. ACM, (2001)Undo and erase events as indicators of usability problems., , , and . CHI, page 659-668. ACM, (2009)Visual instruments for an interactive mural., and . CHI Extended Abstracts, page 234-235. ACM, (1999)