From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Role-based privilege and trust management., и . Comput. Syst. Sci. Eng., (2005)The RSL99 Language for Role-Based Separation of Duty Constraints., и . ACM Workshop on Role-Based Access Control, стр. 43-54. ACM, (1999)A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , и . AAMAS, стр. 178-186. ACM, (2017)Toward Standardization of Authenticated Caller ID Transmission., , , и . IEEE Commun. Stand. Mag., 1 (3): 30-36 (2017)Access control for online social networks third party applications., , , и . Comput. Secur., 31 (8): 897-911 (2012)Efficient construction of provably secure steganography under ordinary covert channels., , , , и . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Reconstructing a formal security model., , и . Inf. Softw. Technol., 44 (11): 649-657 (2002)Role-based access control in DCOM.. J. Syst. Archit., 46 (13): 1175-1184 (2000)Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer., , , , , , и . DSN, стр. 261-273. IEEE, (2023)Certification process artifacts defined as measurable units for software assurance., , и . Softw. Process. Improv. Pract., 12 (2): 165-189 (2007)