From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

dbling: Identifying extensions installed on encrypted web thin clients., , , и . Digit. Investig., (2016)Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation., , и . ACM Trans. Inf. Syst. Secur., 17 (4): 14:1-14:37 (2015)Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage., , , и . IEEE Trans. Parallel Distributed Syst., 23 (12): 2231-2244 (2012)Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance., , , , и . Int. J. Softw. Eng. Knowl. Eng., 16 (6): 851-884 (2006)Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control., , , , , и . ABAC@CODASPY, стр. 68-71. ACM, (2016)Understanding and Predicting Private Interactions in Underground Forums., , , , , и . CODASPY, стр. 303-314. ACM, (2019)Authorization management for role-based collaboration., , , и . SMC, стр. 4128-4134. IEEE, (2003)Locale-based access control: placing collaborative authorization decisions in context., , и . SMC, стр. 4120-4127. IEEE, (2003)Role-based Access Control on the Web Using LDAP., , и . DBSec, том 215 из IFIP Conference Proceedings, стр. 19-30. Kluwer, (2001)Using X.509 Attribute Certificates for Role-Based EAM., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 49-60. Kluwer, (2002)