From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining., , , и . ICISSP (Revised Selected Papers), том 576 из Communications in Computer and Information Science, стр. 49-67. Springer, (2015)Introducing Dynamic Identity and Access Management in Organizations., , , и . ICISS, том 9478 из Lecture Notes in Computer Science, стр. 139-158. Springer, (2015)BusiROLE: A Model for Integrating Business Roles into Identity Management., и . TrustBus, том 5185 из Lecture Notes in Computer Science, стр. 128-138. Springer, (2008)Minimizing insider misuse through secure Identity Management., и . Secur. Commun. Networks, 5 (8): 847-862 (2012)Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach., , , и . DBSec, том 13942 из Lecture Notes in Computer Science, стр. 223-242. Springer, (2023)Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects., и . ECIS, стр. 1322-1333. (2008)Automating Periodic Role-Checks - A Tool-based Approach., и . Wirtschaftsinformatik (1), том 246 из books@ocg.at, стр. 803-814. Österreichische Computer Gesellschaft, (2009)Role Model Optimization for Secure Role-Based Identity Management., , и . ECIS, (2014)Monitoring Access Reviews by Crowd Labelling., , , и . TrustBus, том 12927 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2021)Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management., и . ARES, стр. 374-384. IEEE Computer Society, (2007)