From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies., и . SECRYPT, стр. 386-393. INSTICC Press, (2007)PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile., , , и . TELERISE@ICSE, стр. 2-7. IEEE Computer Society, (2015)Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference., , , и . ICETE (2), стр. 313-320. SciTePress, (2018)Fuzzy Distributed Workflows for Crisis Management Decision Makers., , и . EuroISI, том 5376 из Lecture Notes in Computer Science, стр. 226-236. Springer, (2008)Security for Distributed Machine Learning., , и . SECRYPT, стр. 838-843. SCITEPRESS, (2023)Obligation Based Access Control., и . OTM Workshops, том 8842 из Lecture Notes in Computer Science, стр. 108-116. Springer, (2014)Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection., , , и . ICETE (2), стр. 439-447. SciTePress, (2019)Context-Aware Security Policy for the Service Discovery., , и . AINA Workshops (1), стр. 477-482. IEEE Computer Society, (2007)Web based communication between embedded systems and an ERP., , и . INDIN, стр. 551-556. IEEE, (2009)A Privacy Preserving Framework for Mobile and Cloud., , , и . MOBILESoft, стр. 160-161. IEEE Computer Society, (2015)