From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The design of secure IoT applications using patterns: State of the art and directions for research., , , и . Internet Things, (2021)A Method-Based Authorization Model for Object-Oriented Databases., , и . Security for Object-Oriented Systems, стр. 135-150. Springer, (1993)SIGBDP (Paper Session)., , , , , , и . ACM Annual Conference, стр. 79. ACM, (1976)Interaction with databases through procedural languages., и . ACM Annual Conference (2), стр. 937-945. ACM, (1978)A Programming Language Extension for Access to a Shared Data Base., , и . ACM Pacific, стр. 114-118. (1975)Optimal Scheduling for Homogeneous Multiprocessors., , и . IFIP Congress, стр. 286-290. (1974)A Simplification of a Conversation Design Scheme Using Petri Nets., и . IEEE Trans. Software Eng., 15 (5): 658-660 (1989)Defining Security Requirements Through Misuse Actions., , , и . IFIP Workshop on Advanced Software Engineering, том 219 из IFIP, стр. 123-137. Springer, (2006)A Generalized Forward Recovery Checkpointing Scheme., , и . IPPS/SPDP Workshops, том 1388 из Lecture Notes in Computer Science, стр. 623-643. Springer, (1998)Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild., , , , и . WESPr-iMLSE@APSEC, том 2809 из CEUR Workshop Proceedings, стр. 1-2. CEUR-WS.org, (2018)