From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Microsoft Office Infopath to Generate XACML Policies., , , и . SECRYPT, стр. 379-386. INSTICC Press, (2006)Formal description of the SWIFT identity management framework., , , и . Future Gener. Comput. Syst., 27 (8): 1113-1123 (2011)Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure., , , и . J. Netw. Comput. Appl., 32 (4): 808-823 (2009)Data Cleaning Technique for Security Logs Based on Fellegi-Sunter Theory., , , и . SIGSAND, том 300 из Lecture Notes in Business Information Processing, стр. 3-12. Springer, (2017)Using Microsoft Office InfoPath to Generate XACML Policies., , , и . ICETE (Selected Papers), том 9 из Communications in Computer and Information Science, стр. 134-145. (2006)Support for multiple federation technologies in a Single Sign On architecture., , и . Security and Management, стр. 422-427. CSREA Press, (2008)Grid Authorization Based on Existing AAA Architectures., , , и . WOSIS, стр. 3-12. INSTICC Press, (2006)Trusted Network Access Control in the Eduroam Federation., , , , и . NSS, стр. 170-175. IEEE Computer Society, (2009)Levels of Assurance and Reauthentication in Federated Environments., , , и . EuroPKI, том 5057 из Lecture Notes in Computer Science, стр. 89-103. Springer, (2008)A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms., , , и . WOSIS, стр. 23-32. INSTICC Press, (2007)