From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , и . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)Regulating Exceptions in Healthcare Using Policy Spaces., , , , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 254-267. Springer, (2008)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)A modular approach to composing access control policies., , и . ACM Conference on Computer and Communications Security, стр. 164-173. ACM, (2000)Assessing query privileges via safe and efficient permission composition., , , , и . ACM Conference on Computer and Communications Security, стр. 311-322. ACM, (2008)Classifying Information for External Release., , , и . SEC, том 175 из IFIP Conference Proceedings, стр. 151-160. Kluwer, (2000)Securing XML-based Multimedia Content., и . SEC, том 250 из IFIP Conference Proceedings, стр. 61-72. Kluwer, (2003)An Algebra for Composing Access Control Policies, , и . ACM Transactions on Information and System Security (TISSEC), 5 (1): 1-35 (февраля 2002)An authorization model for temporal XML documents.. SAC, стр. 1088-1093. ACM, (2002)Guest Editorial: Special Issue on Computer and Communications Security., и . ACM Trans. Inf. Syst. Secur., 12 (2): 7:1-7:2 (2008)