Author of the publication

XML-Based Declarative Access Control.

, , , and . SOFSEM, volume 3381 of Lecture Notes in Computer Science, page 310-319. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strengthening Privacy and Confidentiality Protection for Electronic Health Records., and . Web Technologies, Applications, and Services, page 35-40. IASTED/ACTA Press, (2005)Evaluating SOAP for high performance applications in capital markets., and . Comput. Syst. Sci. Eng., (2004)A framework for big data technology in health and healthcare., and . UEMCON, page 401-407. IEEE, (2017)An Architecture for Unifying Web Services Authentication and Authorization., and . ICSOC, volume 3826 of Lecture Notes in Computer Science, page 582-587. Springer, (2005)Extending Collaboration to Mobile Environments., and . Web Technologies, Applications, and Services, page 77-82. IASTED/ACTA Press, (2005)UDDI Access Control., and . ICITA (2), page 778-783. IEEE Computer Society, (2005)Predicting Hospital Length of Stay Using Neural Networks on MIMIC III Data., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 1194-1201. IEEE Computer Society, (2017)Applying a Fuzzy Trust Model to E-Commerce Systems., , , and . Australian Conference on Artificial Intelligence, volume 3809 of Lecture Notes in Computer Science, page 318-329. Springer, (2005)A Design Methodology for User Access Control (UAC) Middleware., , , and . EEE, page 385-390. IEEE Computer Society, (2005)XML Schema-Based Discovery and Invocation of Mobile Services., , and . EEE, page 253-258. IEEE Computer Society, (2004)