From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Composing and combining policies under the policy machine., , , и . SACMAT, стр. 11-20. ACM, (2005)Security Policy Management for Handheld Devices., , , , и . Security and Management, стр. 199-204. CSREA Press, (2003)Proximity-Based Authentication for Mobile Devices., , и . Security and Management, стр. 398-404. CSREA Press, (2005)Administering Access Control in Dynamic Coalitions., , , , и . LISA, стр. 249-261. USENIX, (2005)Application-Oriented Security Policies and Their Composition (Position Paper)., и . Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 67-74. Springer, (1998)Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems., , и . MIST@CCS, стр. 13-22. ACM, (2016)Smart Card Authentication for Mobile Devices., , и . AISM, стр. 38-46. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Imposing Fine-grain Next Generation Access Control over Database Queries., , , и . ABAC@CODASPY, стр. 9-15. ACM, (2017)A Unified Framework for Mobile Device Security., , и . Security and Management, стр. 9-14. CSREA Press, (2004)Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management., и . ACM Workshop on Role-Based Access Control, стр. 81-90. ACM, (1998)