From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Autonomy and Confidentiality: Secure Federated Data Management., , , , и . NGITS, (1995)Beyond the Pale of MAC and DAC-Defining New Forms of Access Control., , и . S&P, стр. 190-200. IEEE Computer Society, (1990)Application-Level Isolation Using Data Inconsistency Detection., , и . ACSAC, стр. 119-126. IEEE Computer Society, (1999)Distributed Concurrency Control with Optional Data Replication., и . DBSec, том A-6 из IFIP Transactions, стр. 149-172. North-Holland, (1991)Intrusion Confinement by Isolation in Information Systems, , и . Proceedings of IFIP Workshop on Database Security, (1999)Benchmarking multilevel secure database systems using the MITRE benchmark., , , и . ACSAC, стр. 86-95. IEEE, (1994)Application-Level Isolation to Cope with Malicious Database Users., , и . ACSAC, стр. 73-82. IEEE Computer Society, (1998)Flexible Security Policies for Digital Libraries., , и . ACM Comput. Surv., 28 (4es): 110 (1996)Panel Discussion: Security for Distributed Database Management Systems.. DBSec, том A-21 из IFIP Transactions, стр. 143-148. North-Holland, (1992)A model of atomicity for multilevel transactions., , , и . S&P, стр. 120-134. IEEE Computer Society, (1993)