From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 23-30. IEEE Computer Society, (2014)A Prototype for Enforcing Usage Control Policies Based on XACML., , и . TrustBus, том 7449 из Lecture Notes in Computer Science, стр. 79-92. Springer, (2012)Access and Usage Control in Grid.. University of Pisa, Italy, (2011)Towards Policy Engineering for Attribute-Based Access Control., , , и . INTRUST, том 8292 из Lecture Notes in Computer Science, стр. 85-102. Springer, (2013)Usage control in cloud systems., , , и . ICITST, стр. 202-207. IEEE, (2012)Usage Control, Risk and Trust., , , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2010)Influence of Attribute Freshness on Decision Making in Usage Control., , , и . STM, том 6710 из Lecture Notes in Computer Science, стр. 35-50. Springer, (2010)On Usage Control for GRID Services., , , и . CSO (1), стр. 47-51. IEEE Computer Society, (2009)Extending Security-by-Contract with Quantitative Trust on Mobile Devices., , , , , и . CISIS, стр. 872-877. IEEE Computer Society, (2010)A Proposal on Enhancing XACML with Continuous Usage Control Features., , , и . CoreGRID@Euro-Par, стр. 133-146. Springer, (2009)