Author of the publication

Access Control Model for Secure XML Documents.

, , , and . ACIS-ICIS, page 352-357. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML Access Control for Security and Memory Management., , and . INTELLCOMM, volume 190 of IFIP, page 179-189. Springer, (2005)Convergence P2P context awareness., , and . Peer-to-Peer Netw. Appl., 9 (3): 461-464 (2016)Design of HDTS System for Locating Logical Errors in Java Programs., , and . ACIS-ICIS, page 418-423. IEEE Computer Society, (2005)Access Control Mechanism for XML Document., and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 81-90. Springer, (2011)Communication and Ubiquitous Computing., , and . Wireless Personal Communications, 86 (1): 1-6 (2016)An Efficient Authorization Mechanism for Secure XML Sources on the Web., and . J. Adv. Comput. Intell. Intell. Informatics, 10 (5): 721-727 (2006)Debugging of Java Programs Using HDT with Program Slicing., , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 524-533. Springer, (2004)Access Control Model for Secure XML Documents., , , and . ACIS-ICIS, page 352-357. IEEE Computer Society, (2005)Design of Translator for Stack-Based Codes from 3-Address Codes in CTOC., , and . ACIS-ICIS, page 32-36. IEEE Computer Society, (2005)ABS Scheduling Technique for Interference Mitigation of M2M Based Medical WBAN Service., , and . Wireless Personal Communications, 79 (4): 2685-2700 (2014)