Author of the publication

On Lattices in Access Control Models.

, , and . ICCS, volume 4068 of Lecture Notes in Computer Science, page 374-387. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak factor automata: the failure of failure factor oracles?, , and . South Afr. Comput. J., (2014)A comparison of simulated traffic conditioner performance., , and . Comput. Commun., 31 (17): 3933-3940 (2008)Weak Factor Automata: Comparing (Failure) Oracles and Storacles., , and . Stringology, page 176-190. Department of Theoretical Computer Science, Faculty of Information Technology, Czech Technical University in Prague, (2013)An Algorithm for Ordering Refactorings Based on Fine-Grained Model Transformations., , and . SoMeT, volume 182 of Frontiers in Artificial Intelligence and Applications, page 225-243. IOS Press, (2008)Agile software development: a contemporary philosophical perspective., , , , and . SAICSIT, volume 226 of ACM International Conference Proceeding Series, page 106-115. ACM, (2007)On Implementation and Performance of Table-Driven DFA-Based String Processors., , and . Int. J. Found. Comput. Sci., 19 (1): 53-70 (2008)Foiling an Attack - Defeating IPSec Tunnel Fingerprinting., , and . ISSA, page 1-14. ISSA, Pretoria, South Africa, (2005)Refactoring Tools and Complementary Techniques., , , and . AICCSA, page 685-688. IEEE Computer Society, (2006)Sensitivity analysis of Voronoi-based sensor deployment and reconfiguration algorithms., , and . South Afr. Comput. J., (2009)An Approach to Defining Abstractions, Refinements and Enrichments. Quaestions Informaticae, 6 (4): 174--178 (1989)