Author of the publication

Description of Temporal Constraints Using Semantic Web in Role-Based Access Control.

, , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 186-195. IOS Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kobayashi, Hiromi
add a person with the name Kobayashi, Hiromi
 

Other publications of authors with the same name

Bitonic sort on a network computer with a node failure., , , and . Systems and Computers in Japan, 25 (10): 15-23 (1994)A Formal Technique to Analyze Event Concurrent Response., and . IEICE Transactions, 78-D (10): 1321-1323 (1995)Description of Temporal Constraints Using Semantic Web in Role-Based Access Control., , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 186-195. IOS Press, (2006)Properties of Role-Based Access Control in a Teaching Management System., and . IEICE Transactions, 88-D (10): 2417-2421 (2005)Nearest Neighbor Mesh Hypercube Multiprocessor Networks for Autonomous Decentralized Systems.. PDPTA, page 1276-1284. CSREA Press, (1997)A proposal of credit transfer system using owl in education., and . IMSA, page 1-5. IASTED/ACTA Press, (2006)Safety Analysis Using Temporal Database.. PRDC, page 379-382. IEEE Computer Society, (2001)State fence diagrams - A graphical representation for designing reactive systems., , and . Systems and Computers in Japan, 30 (6): 13-22 (1999)Connecting Distributed Information Using the Semantic Web., , and . JCKBSE, volume 180 of Frontiers in Artificial Intelligence and Applications, page 273-277. IOS Press, (2008)A Safety Mechanism Using Software Patterns., and . Electron. Notes Theor. Comput. Sci., 82 (6): 110-120 (2003)