Author of the publication

Access Control Model for Secure XML Documents.

, , , and . ACIS-ICIS, page 352-357. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Translator for generating Java Bytecode from Thread code of Multithreaded Models., , , and . PDPTA, CSREA Press, (2000)Access Control Technique for XML Documents., , , , and . International Conference on Internet Computing, page 129-135. CSREA Press, (2005)Design of Flexible Authorization System and Small Memory Management for XML Data Protection on the Server., and . KES (1), volume 4251 of Lecture Notes in Computer Science, page 451-458. Springer, (2006)A Method for Acquiring Fingerprint by Linear Sensor., and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 410-416. Springer, (2005)The Efficient Debugging System for Locating Logical Errors in Java Programs., and . ICCSA (1), volume 2667 of Lecture Notes in Computer Science, page 684-693. Springer, (2003)Separation Set Partitioning: Algorithm to Partition Nonstrict Programs into Sequential Threads., , and . HICSS (1), page 626-627. IEEE Computer Society, (1997)Design of Translator for Generating Java Bytecode in Distributed Environment., , and . PDPTA, page 1017-1021. CSREA Press, (2002)Dead Code Elimination in CTOC., , and . SERA, page 584-588. IEEE Computer Society, (2007)XML Access Control for Security and Memory Management., , and . INTELLCOMM, volume 190 of IFIP, page 179-189. Springer, (2005)An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 48-55. Springer, (2005)