Author of the publication

Role-Based Authorization Constraints Specification Using Object Constraint Language.

, and . WETICE, page 157-162. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing and Managing Role-Based Access Control Policies., , , and . IEEE Trans. Knowl. Data Eng., 20 (7): 924-939 (2008)Role-based access control in DCOM.. Journal of Systems Architecture, 46 (13): 1175-1184 (2000)Efficient construction of provably secure steganography under ordinary covert channels., , , , and . SCIENCE CHINA Information Sciences, 55 (7): 1639-1649 (2012)Reconstructing a formal security model., , and . Information & Software Technology, 44 (11): 649-657 (2002)Role-based privilege and trust management., and . Comput. Syst. Sci. Eng., (2005)CONUGA: Constrained User-Group Assignment., and . J. Network and Computer Applications, 24 (2): 87-100 (2001)Secure and efficient random functions with variable-length output., , , , and . J. Network and Computer Applications, (2014)Policy-driven security management for fog computing: Preliminary framework and a case study., , and . IRI, page 16-23. IEEE, (2014)Ontology-Based Risk Evaluation in User-Centric Identity Management., and . ICC, page 1-5. IEEE, (2011)Certification process artifacts defined as measurable units for software assurance., , and . Software Process: Improvement and Practice, 12 (2): 165-189 (2007)