From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Management of security policy configuration using a Semantic Threat Graph approach., и . Journal of Computer Security, 19 (3): 567-605 (2011)Management of heterogeneous security access control configuration using an ontology engineering approach., и . SafeConfig, стр. 27-36. ACM, (2010)Consumer-Managed Federated Homes., , , , , и . IEEE Commun. Mag., 52 (6): 194-201 (2014)Semantic Web and firewall alignment., и . ICDE Workshops, стр. 447-453. IEEE Computer Society, (2008)Federated autonomic management of HAN services., , , , , , и . Integrated Network Management, стр. 646-649. IEEE, (2011)Federated Autonomic Network Access Control., , и . SafeConfig, IEEE, (2011)Decentralized Semantic Threat Graphs., и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 177-192. Springer, (2012)An Approach to Security Policy Configuration Using Semantic Threat Graphs., и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2009)Automated Smartphone Security Configuration., , и . DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2012)Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration., , , , и . IPOM, том 4268 из Lecture Notes in Computer Science, стр. 168-180. Springer, (2006)