Author of the publication

A BLP-Based Access Control Mechanism for the Virtual Machine System.

, , , and . ICYCS, page 2278-2282. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing., , , , , and . Computers & Security, (2014)Some Upper Bounds on the Inverse Relative Dimension/Length Profile., , and . IEICE Transactions, 91-A (12): 3731-3737 (2008)3D Facial Model Synthesis using Voronoi Approach., and . ISVD, page 132-137. IEEE Computer Society, (2006)NPAR by Example: Line Drawing Facial Animation from Photographs., , and . CGIV, page 514-521. IEEE Computer Society, (2006)Coarse Fingerprint Matching Based on Singular Points., and . Security and Management, page 425-433. CSREA Press, (2005)Some new characters on the wire-tap channel of type II., , , and . IEEE Trans. Information Theory, 51 (3): 1222-1229 (2005)Differentially Private Wireless Data Publication in Large-Scale WLAN Networks., , , and . ICPADS, page 290-297. IEEE Computer Society, (2015)Autonomous cooperative energy trading between prosumers for microgrid systems., , , and . LCN Workshops, page 693-696. IEEE Computer Society, (2014)The impacts of internal threats towards Routing Protocol for Low power and lossy network performance., , , and . ISCC, page 789-794. IEEE Computer Society, (2013)Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes., , and . IEEE Trans. Information Theory, 65 (2): 1048-1053 (2019)