From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unwinding and the LOCK Proof Referees Study., , и . CSFW, стр. 9-21. IEEE Computer Society, (1992)Two Automated Methods in Implementation Proofs., и . CADE, том 310 из Lecture Notes in Computer Science, стр. 622-642. Springer, (1988)A Framework for Composition of Security Models., и . CSFW, стр. 157-166. IEEE Computer Society, (1992)Noninterference and Intrusion Detection., и . S&P, стр. 177-187. IEEE Computer Society, (2002)FDMM: A Formalism for Describing ADOxx Meta Models and Models., , и . ICEIS (3), стр. 133-144. SciTePress, (2012)Ontology Repositories and Semantic Artefact Catalogues with the OntoPortal Technology., , , , , , , , , и 1 other автор(ы). ISWC, том 14266 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2023)Managing Change: An Ontology Version Control System., , , и . OWLED, том 432 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Formal Policies for Trusted Processes., , и . CSFW, стр. 31-40. IEEE Computer Society, (1989)A Lattice of Information., и . CSFW, стр. 65-70. IEEE Computer Society, (1993)A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies., и . CSFW, стр. 127-138. MITRE Corporation Press, (1988)