From post

Security model for distributed object framework and its applicability to CORBA.

, и . SEC, том 54 из IFIP Conference Proceedings, стр. 452-463. Chapman & Hall, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anti-phishing: A comprehensive perspective., , , , и . Expert Syst. Appl., 238 (Part F): 122199 (марта 2024)A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context., , , и . IEEE Trans. Serv. Comput., 16 (3): 1647-1661 (мая 2023)Shared RFID ownership transfer protocols., , , и . Comput. Stand. Interfaces, (2015)On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain., , , , и . IEEE Trans. Ind. Informatics, 16 (5): 3521-3530 (2020)A mathematical model for system design and refinement.. Int. J. Comput. Math., 34 (1-2): 13-31 (1990)Reducing the scope of denial of service attacks in QoS routing., , и . GLOBECOM, стр. 1368-1373. IEEE, (2003)Distributed service control technique for detecting security attacks., и . NOMS, стр. 574-577. IEEE, (2012)On the design of Virtual machine Intrusion detection system., и . Integrated Network Management, стр. 682-685. IEEE, (2011)On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems., , , и . MobiQuitous, стр. 432-441. ACM, (2017)Feature-Distributed Malware Attack: Risk and Defence., и . ESORICS (2), том 8713 из Lecture Notes in Computer Science, стр. 457-474. Springer, (2014)