From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control: The Neglected Frontier.. ACISP, том 1172 из Lecture Notes in Computer Science, стр. 219-227. Springer, (1996)Secure Information and Resource Sharing in Cloud Infrastructure as a Service., , и . WISCS@CCS, стр. 81-90. ACM, (2014)Stale-safe security properties for group-based secure information sharing., , , и . FMSE, стр. 53-62. ACM, (2008)Classifying and Comparing Attribute-Based and Relationship-Based Access Control., , и . CODASPY, стр. 59-70. ACM, (2017)Machine Learning in Access Control: A Taxonomy and Survey., , , , , и . CoRR, (2022)Secure Role-Based Workflow Models., и . DBSec, том 215 из IFIP Conference Proceedings, стр. 45-58. Kluwer, (2001)Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 166-181. Chapman & Hall, (1997)Separation of Duties in Computerized Information Systems.. DBSec, стр. 179-190. North-Holland, (1990)Polyinstantiation Integrity in Multilevel Relations Revisited., и . DBSec, стр. 297-308. North-Holland, (1990)The UCONABC usage control model., и . ACM Trans. Inf. Syst. Secur., 7 (1): 128-174 (2004)