From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , и . TrustCom/BigDataSE/ISPA (1), стр. 718-725. IEEE, (2015)A Framework for Evaluating Privacy Preserving Data Mining Algorithms., , и . Data Min. Knowl. Discov., 11 (2): 121-154 (2005)Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols., , и . DBSec, том A-60 из IFIP Transactions, стр. 259-274. North-Holland, (1994)A new Authorization Model for Object-Oriented Databases., , и . DBSec, том A-60 из IFIP Transactions, стр. 199-222. North-Holland, (1994)Administration Policies in a Multipolicy Autorization System., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 341-355. Chapman & Hall, (1997)Distributed Cooperative Updates of XML Documents., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 147-159. Kluwer, (2002)Local Closed-World Assumptions for reasoning about Semantic Web data., , и . APPIA-GULP-PRODE, стр. 314-323. (2003)Detecting anomalous access patterns in relational databases., , и . VLDB J., 17 (5): 1063-1077 (2008)State-of-the-art in privacy preserving data mining, , , , , и . SIGMOD Rec., 33 (1): 50--57 (марта 2004)