Author of the publication

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.

, , and . POLICY, page 142-149. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Context-Aware Mandatory Access Control Model for Multilevel Security Environments., , and . SAFECOMP, volume 5219 of Lecture Notes in Computer Science, page 401-414. Springer, (2008)Integrity Checking for Aggregate Queries., and . IEEE Access, (2021)A Semantic aware Access Control model with real time constraints on history of accesses., , and . IMCSIT, page 827-836. IEEE, (2008)Specification of History Based Constraints for Access Control in Conceptual Level., , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 186-200. Springer, (2010)Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique., , , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 116-133. Springer, (2008)Conflict Detection and Resolution in Context-Aware Authorization., , and . AINA Workshops (1), page 505-511. IEEE Computer Society, (2007)Trust Inference in Web-Based Social Networks Using Resistive Networks., , and . ICIW, page 233-238. IEEE Computer Society, (2008)Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 192-203. Springer, (2005)Cooperative security administration in multi-security-domain environments using a variant of deontic logic., , , and . Sci. Iran., 19 (3): 635-653 (2012)CAMAC: a context-aware mandatory access control model., and . ISeCure, 1 (1): 35-54 (2009)