//-->
Enhance the security properties and information flow control
El Moussaid, Nadya, (2020)
Mit dem E-Perso in die Wolke
Reisner, Stefan, (2011)
Development of Trust Based Access Control Models Using Fuzzy Logic in Cloud Computing
Kesarwani, Abhishek, (2020)
Two-Level Data Collection for an Energy-Efficient Solution in Wireless Sensor Networks: Multi-Agent System Approach
Benaziz, Besma, (2016)