From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

XML-GL: A Graphical Language for Querying and Reshaping XML Documents., , , , , и . QL, W3C, (1998)The IDEA Web Lab., , и . SIGMOD Conference, стр. 587-589. ACM Press, (1998)Distributed Query Evaluation over Encrypted Data., , , , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 96-114. Springer, (2021)Automatic Generation of Production Rules for Integrity Maintenance., , , и . ACM Trans. Database Syst., 19 (3): 367-422 (1994)DockerPolicyModules: Mandatory Access Control for Docker containers., , , и . CNS, стр. 749-750. IEEE, (2015)Run-time Detection of Non-Terminating Active Rule Systems., , и . DOOD, том 1013 из Lecture Notes in Computer Science, стр. 38-54. Springer, (1995)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)Mix&Slice for Efficient Access Revocation on Outsourced Data., , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1390-1405 (мая 2024)Efficient and Private Access to Outsourced Data., , , , и . ICDCS, стр. 710-719. IEEE Computer Society, (2011)P2P-Based Collaborative Spam Detection and Filtering., , , и . Peer-to-Peer Computing, стр. 176-183. IEEE Computer Society, (2004)