From post

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.

, , , и . Privacy Enhancing Technologies, том 4258 из Lecture Notes in Computer Science, стр. 78-98. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Incentivizing Distributive Fairness for Crowdsourcing Workers., , и . AAMAS, стр. 404-412. International Foundation for Autonomous Agents and Multiagent Systems, (2019)XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks., и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 223-238. Springer, (2012)A Flexible Access Control Model for Web Services., и . FQAS, том 3055 из Lecture Notes in Computer Science, стр. 13-16. Springer, (2004)Trust-Chi: An XML Framework for Trust Negotiations., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 146-157. Springer, (2003)Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies., , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 386-397. Springer, (2007)SecLoc: Securing Location-Sensitive Storage in the Cloud., , , , и . SACMAT, стр. 51-61. ACM, (2015)An assessment of accountability policies for large-scale distributed computing systems., , и . CSIIRW, стр. 39. ACM, (2009)End-to-end accountability in grid computing systems for coalition information sharing., , , и . CSIIRW, стр. 29:1-29:3. ACM, (2008)A Brokerage-Based Approach for Cloud Service Selection., , и . IEEE CLOUD, стр. 558-565. IEEE Computer Society, (2012)Content Sharing Design for Social Welfare in Networked Disclosure Game., , , и . UAI, том 216 из Proceedings of Machine Learning Research, стр. 973-983. PMLR, (2023)