Author of the publication

Static Compliance Checking beyond Separation of Duty Constraints.

, , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation of the left ventricle in cardiac MRI using a hierarchical extreme learning machine model., , , , , , and . Int. J. Machine Learning & Cybernetics, 9 (10): 1741-1751 (2018)An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification., , , , and . JCP, 9 (2): 388-395 (2014)A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud., , , , and . TrustCom/BigDataSE/ICESS, page 347-354. IEEE Computer Society, (2017)A new iterative synthetic data generation method for CNN based stroke gesture recognition., , , , , , and . Multimedia Tools Appl., 77 (13): 17181-17205 (2018)Stability and Hopf bifurcation of a HIV infection model with CTL-response delay., , and . Computers & Mathematics with Applications, 62 (8): 3091-3102 (2011)Weighted Lee Algorithm on Rectilinear Steiner Tree with Obstacles and Boundary., and . CSIE (3), page 369-374. IEEE Computer Society, (2009)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs., , , , and . ICWS, page 666-671. IEEE Computer Society, (2016)Android Multi-Level System Permission Management Approach., , , , and . CoRR, (2017)A spatial predator-prey system with non-renewable resources., , , , and . Applied Mathematics and Computation, (2019)