From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MAC and UML for secure software design., , , и . FMSE, стр. 75-85. ACM, (2004)Role Slices: A Notation for RBAC Permission Assignment and Enforcement., , , , и . DBSec, том 3654 из Lecture Notes in Computer Science, стр. 40-53. Springer, (2005)URBS Enforcement Mechanisms for Object-Oriented Systems., , , и . DBSec, том 51 из IFIP Conference Proceedings, стр. 79-94. Chapman & Hall, (1995)Privacy and Confidentiality in Healthcare Delivery Information System.. CBMS, стр. 2-. IEEE Computer Society, (1999)Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications., и . J. Comput. Secur., 5 (4): 341-382 (1997)Software Agents for Role Based Security., , , и . DBSec, том 171 из IFIP Conference Proceedings, стр. 79-93. Kluwer, (1999)Role Based Security and Java., , , и . DBSec, том 142 из IFIP Conference Proceedings, стр. 205-219. Kluwer, (1998)Panel on Intrusion Detection., , , , и . DBSec, том 171 из IFIP Conference Proceedings, стр. 227-234. Kluwer, (1999)Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment., , и . DBSec, том A-60 из IFIP Transactions, стр. 77-94. North-Holland, (1994)Security Assurance for an RBAC/MAC Security Model., , и . IAW, стр. 260-267. IEEE, (2003)