Propagating Modifications to Mobile Policies
暂无分享,去创建一个
Sushil Jajodia | Kenneth P. Smith | Amgad Fayad | Donald B. Faatz | S. Jajodia | D. Faatz | A. Fayad
[1] Sushil Jajodia,et al. Using attribute certificates with mobile policies in electronic commerce applications , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[2] Sushil Jajodia,et al. Maintaining Replicated Authorizations in Distributed Database Systems , 1996, Data Knowl. Eng..
[3] Hector Garcia-Molina,et al. Consistency in a partitioned network: a survey , 1985, CSUR.
[4] Alan C. Evans,et al. A Comparison of Retrospective Intensity Non-uniformity Correction Methods for MRI , 1997, IPMI.
[5] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] D. Louis Collins,et al. Application of Information Technology: A Four-Dimensional Probabilistic Atlas of the Human Brain , 2001, J. Am. Medical Informatics Assoc..
[7] D. Louis Collins,et al. Automatic 3‐D model‐based neuroanatomical segmentation , 1995 .
[8] Sushil Jajodia,et al. Distributed Policies for Data Management - Making Policies Mobile , 2000, DBSec.