Author of the publication

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.

, , , and . Comput. J., 52 (8): 861-870 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A VMM-based intrusion prevention system in cloud computing environment., , , , , , and . The Journal of Supercomputing, 66 (3): 1133-1151 (2013)Building Automated Trust Negotiation architecture in virtual computing environment., , , and . The Journal of Supercomputing, 55 (1): 69-85 (2011)Real-Time Strategy and Practice in Service Grid., , , , , and . COMPSAC, page 161-166. IEEE Computer Society, (2004)A Scalable Service Scheme for Secure Group Communication in Grid., , , , and . COMPSAC (1), page 31-38. IEEE Computer Society, (2007)An adaptive meta-scheduler for data-intensive applications., , , and . IJGUC, 1 (1): 32-37 (2005)Theory and methodology of research on cloud security., , and . SCIENCE CHINA Information Sciences, 59 (5): 050105:1-050105:3 (2016)Multi-version Execution for the Dynamic Updating of Cloud Applications., , , , and . COMPSAC, page 185-190. IEEE Computer Society, (2015)Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage., , , and . UIC/ATC/ScalCom, page 510-517. IEEE Computer Society, (2014)CloudMon: Monitoring Virtual Machines in Clouds., , , and . IEEE Trans. Computers, 65 (12): 3787-3793 (2016)SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities., , , , , , , and . CoRR, (2018)