From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Advanced Commit Protocol for MLS Distributed Database Systems., , , и . ACM Conference on Computer and Communications Security, стр. 119-128. ACM, (1996)A Non-Timestamped Authorization Model for Data Management Systems., , и . ACM Conference on Computer and Communications Security, стр. 169-178. ACM, (1996)Authorizations in Relational Database Management Systems., , и . ACM Conference on Computer and Communications Security, стр. 130-139. ACM, (1993)DBMask: Fine-Grained Access Control on Encrypted Relational Databases., , , и . CODASPY, стр. 1-11. ACM, (2015)XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, , и . SACMAT, стр. 219-227. ACM, (2006)Purpose based access control of complex data for privacy protection., , и . SACMAT, стр. 102-110. ACM, (2005)Digital identity management and protection.. PST, том 380 из ACM International Conference Proceeding Series, стр. 1. ACM, (2006)A multigranular spatiotemporal data model., , , и . GIS, стр. 94-101. ACM, (2003)Grid based methods for estimating spatial join selectivity., , и . GIS, стр. 92-100. ACM, (2004)Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems., , , и . ACM Trans. Inf. Syst. Secur., 9 (4): 421-460 (2006)