From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authorization management for role-based collaboration., , , и . SMC, стр. 4128-4134. IEEE, (2003)Locale-based access control: placing collaborative authorization decisions in context., , и . SMC, стр. 4120-4127. IEEE, (2003)Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance., , , , и . Int. J. Softw. Eng. Knowl. Eng., 16 (6): 851-884 (2006)Supporting secure collaborations with attribute-based access control., , и . CollaborateCom, стр. 525-530. ICST / IEEE, (2013)Beyond User-to-User Access Control for Online Social Networks., , и . ICICS, том 5308 из Lecture Notes in Computer Science, стр. 174-189. Springer, (2008)dbling: Identifying extensions installed on encrypted web thin clients., , , и . Digit. Investig., (2016)Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation., , и . ACM Trans. Inf. Syst. Secur., 17 (4): 14:1-14:37 (2015)Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage., , , и . IEEE Trans. Parallel Distributed Syst., 23 (12): 2231-2244 (2012)Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology., , , и . ER, том 5231 из Lecture Notes in Computer Science, стр. 183-198. Springer, (2008)Role-based access management for ad-hoc collaborative sharing., и . SACMAT, стр. 200-209. ACM, (2006)