Author of the publication

A Lightweight Type Enforcement Access Control Approach with Role Based Authorization.

, , , , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 514-521. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Stability of Incompressible Flow Using a Mixed Finite Element Method, and . Journal of Computational Physics, 139 (2): 243 - 273 (1998)Research on Linux Trusted Boot Method Based on Reverse Integrity Verification., , , , , and . Sci. Program., (2016)Trusted-Committee- Based Secure and Scalable BFT Consensus for Consortium Blockchain., , , , , and . MSN, page 363-370. IEEE, (2022)ECascade-RCNN: Enhanced Cascade RCNN for Multi-scale Object Detection in UAV Images., , , , , and . ICARA, page 268-272. IEEE, (2021)Global Illumination of Dynamic 3D Scene Based on Light Transport Path Reusing., , , , and . iThings/GreenCom/CPSCom/SmartData, page 259-263. IEEE Computer Society, (2017)Visually Grounded Task and Motion Planning for Mobile Manipulation., , , , , and . ICRA, page 1925-1931. IEEE, (2022)Design and comprehensive analysis of a novel structure of ARCL-to-SCL GSG transition for millimeter wave applications., , , and . IEICE Electron. Express, 20 (3): 20220526 (2023)A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment., , , , , and . IEEE Trans. Parallel Distributed Syst., 27 (2): 305-316 (2016)A Survey on Data Migration Management in Cloud Environment., , , , and . J. Digit. Inf. Manag., 10 (5): 324-331 (2012)VirusFinder: A Web-Based Virus Identification System Using Viral Nucleotide Signatures., , and . CSB, page 652-653. IEEE Computer Society, (2004)