From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computational Science in High School Curricula: The ORESPICS Approach., и . International Conference on Computational Science (3), том 2331 из Lecture Notes in Computer Science, стр. 898-907. Springer, (2002)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , и . NetSoft, стр. 254-256. IEEE, (2019)A survey on privacy in decentralized online social networks., , и . Comput. Sci. Rev., (2018)Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions., , , и . Comput. Commun., (апреля 2023)Security and Trust Management for Virtual Organisations: GridTrust Approach., и . IFIPTM, том 300 из IFIP Advances in Information and Communication Technology, стр. 306-309. Springer, (2009)A Fine-Grained and X.509-Based Access Control System for Globus., , , , и . OTM Conferences (2), том 4276 из Lecture Notes in Computer Science, стр. 1336-1350. Springer, (2006)Extending the Globus Architecture with Role-Based Trust Management., , , и . EUROCAST, том 4739 из Lecture Notes in Computer Science, стр. 448-456. Springer, (2007)Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project., , , и . IEEE Secur. Priv., 20 (1): 33-44 (2022)Usage control in cloud systems., , , и . ICITST, стр. 202-207. IEEE, (2012)A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement., , , , и . WEBIST (Revised Selected Papers), том 372 из Lecture Notes in Business Information Processing, стр. 78-98. Springer, (2018)