From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fault coverage of Constrained Random Test Selection for access control: A formal analysis., , и . J. Syst. Softw., 83 (12): 2607-2617 (2010)Quantifying the role of access control in end-to-end network security., , и . ICUMT, стр. 1-6. IEEE, (2011)Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment., , , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (5): 478-493 (2017)Conformance Testing of Temporal Role-Based Access Control Systems., , и . IEEE Trans. Dependable Secur. Comput., 7 (2): 144-158 (2010)Efficiently Managing Security Concerns in Component Based System Design., , и . COMPSAC (1), стр. 164-169. IEEE Computer Society, (2005)Security-enhanced Android for an enterprise., , и . Int. J. Secur. Networks, 17 (2): 92-106 (2022)Enterprise Mobile Device Management Requirements and Features., и . INFOCOM Workshops, стр. 109-114. IEEE, (2020)Integrating GSTRBAC spatial constraints in X-GTRBAC., , , и . FIT, стр. 50:1-50:6. ACM, (2009)Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems., , , и . Comput. Secur., (февраля 2024)A Role-Based Access Control Policy Verification Framework for Real-Time Systems., , , и . WORDS, стр. 13-20. IEEE Computer Society, (2005)