From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Assumptions Underlying Agile Software Development Processes., , и . CoRR, (2014)Using uml to visualize role-based access control constraints., , , и . SACMAT, стр. 115-124. ACM, (2004)Limitations of Agile Software Processes., , и . CoRR, (2014)A Formal Specification of an Authorization Model for Object-Oriented Databases., , и . DBSec, том 51 из IFIP Conference Proceedings, стр. 95-110. Chapman & Hall, (1995)Using Roles for Pattern-Based Model Refactoring, , , и . (2002)Tool Support for Aspect-Oriented Design., , и . OOIS Workshops, том 2426 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2002)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 97-112. Springer, (2013)Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework., , и . ICISS, том 9478 из Lecture Notes in Computer Science, стр. 79-97. Springer, (2015)Analysing Requirements to Detect Latent Security Vulnerabilities., , и . SERE (Companion), стр. 168-175. IEEE, (2014)Guidelines for Formalizing Fusion Object-Oriented Analysis Methods ., , , и . CAiSE, том 1080 из Lecture Notes in Computer Science, стр. 222-233. Springer, (1996)