Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flexible access control model for workflows., and . CSCWD, page 606-612. IEEE, (2008)An authorization model for collaborative access control., , and . Journal of Zhejiang University - Science C, 11 (9): 699-717 (2010)Research and Implementation of Role-Based RBAC Administration Model., , , and . CIT, page 746-750. IEEE Computer Society, (2005)A reconnection-driven model of the hard X-ray loop-top source from flare 2004-Feb-26, , and . (Oct 25, 2016)Responsibility Management through Responsibility Networks., , and . CoRR, (2021)A Data-driven Human Responsibility Management System., , , , , , , , and . IEEE BigData, page 5834-5838. IEEE, (2020)An Ontology-Based Functional Modeling Approach for Multi-agent Distributed Design on the Semantic Web., , , , and . CSCWD (Selected papers), volume 3865 of Lecture Notes in Computer Science, page 334-343. Springer, (2005)The Internet of Responsibilities-Connecting Human Responsibilities using Big Data and Blockchain., , , , , , , , and . CoRR, (2023)The Internet of Responsibilities - Connecting Human Responsibilities using Big Data and Blockchain., , , , , , , , and . IEEE BigData, page 6226-6228. IEEE, (2019)Jacquard Image Segmentation Method Based on Fuzzy Optimization Technology., , , , and . RSFDGrC (2), volume 3642 of Lecture Notes in Computer Science, page 273-282. Springer, (2005)