From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A model for usage control in GRID systems., и . SecureComm, стр. 169-175. IEEE, (2007)A Prototype for Enforcing Usage Control Policies Based on XACML., , и . TrustBus, том 7449 из Lecture Notes in Computer Science, стр. 79-92. Springer, (2012)A Smart Contract Based Recommender System., , , и . GECON, том 11819 из Lecture Notes in Computer Science, стр. 29-42. Springer, (2019)Towards Continuous Usage Control on Grid Computational Services., , и . ICAS/ICNS, стр. 82. IEEE Computer Society, (2005)Enforcement of U-XACML History-Based Usage Control Policy., , , и . STM, том 9871 из Lecture Notes in Computer Science, стр. 64-81. Springer, (2016)Enhancing Usage Control for Performance: An Architecture for Systems of Systems., , , , и . CyberICPS/SECPRE@ESORICS, том 11387 из Lecture Notes in Computer Science, стр. 69-84. Springer, (2018)Blockchain Based Access Control., , и . DAIS, том 10320 из Lecture Notes in Computer Science, стр. 206-220. Springer, (2017)Introducing Usage Control in MQTT., , , , и . CyberICPS/SECPRE@ESORICS, том 10683 из Lecture Notes in Computer Science, стр. 35-43. Springer, (2017)Measuring EOS.IO DApp Resource Allocation and Costs through a Benchmark Application., , , и . ICBTA, стр. 24-30. ACM, (2021)The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis., , и . SECRYPT, стр. 511-519. SCITEPRESS, (2023)