From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy in Social Networks, , и . Encyclopedia of Information Science and Technology, Second ed., VII, IGI Global, Hershey, PA, (2008)Enforcing access control in Web-based social networks., , и . ACM Trans. Inf. Syst. Secur., 13 (1): 6:1-6:38 (2009)Securing XML data in third-party distribution systems., , и . CIKM, стр. 99-106. ACM, (2005)Privacy-Preserving Sequential Publishing of Knowledge Graphs., , и . ICDE, стр. 2021-2026. IEEE, (2021)A framework to enforce access control over data streams., , , и . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks., , , и . CODASPY, стр. 51-62. ACM, (2011)Risk Assessment in Social Networks Based on User Anomalous Behaviors., , и . IEEE Trans. Dependable Secur. Comput., 15 (2): 295-308 (2018)Specifying Access Control Policies on Data Streams., , и . DASFAA, том 4443 из Lecture Notes in Computer Science, стр. 410-421. Springer, (2007)A Risk Assessment Mechanism for Android Apps., , и . SmartIoT, стр. 237-244. IEEE, (2021)PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation., , и . ISPEC, том 13620 из Lecture Notes in Computer Science, стр. 306-323. Springer, (2022)