Author of the publication

BTA: Architecture for Reusable Business Tier Components with Access Control.

, , and . ICCSA (3), volume 7335 of Lecture Notes in Computer Science, page 682-697. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-purpose Adaptable Business Tier Components based on Call Level Interfaces., and . ICIS, page 215-221. IEEE Computer Society, (2015)Server-Side Database Credentials: A Security Enhancing Approach for Database Access., , and . DATA (Revised Selected Papers), volume 814 of Communications in Computer and Information Science, page 215-236. Springer, (2017)Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model., , and . SECRYPT, page 292-301. SciTePress, (2016)Concurrent Call Level Interfaces Based on an Embedded Thread Safe Local Memory Structure., and . SEKE, page 129-134. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2017)Reusable Business Tier Components: Based on CLI and Driven by a Single Wide Typed Service., , and . Int. J. Softw. Innov., 2 (1): 37-60 (2014)A search space optimization method for fuzzy access control auditing., , and . Knowl. Inf. Syst., 62 (10): 3973-3994 (2020)ABC Architecture: A New Approach to Build Reusable and Adaptable Business Tier Components Based on Static Business Interfaces., , and . ENASE (Selected Papers), volume 275 of Communications in Computer and Information Science, page 114-129. Springer, (2011)BDFIS: Binary Decision Access Control Model Based On Fuzzy Inference Systems., , and . SEKE, page 503-654. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)On the Application of Fuzzy Set Theory for Access Control Enforcement., , and . SECRYPT, page 540-547. SciTePress, (2017)Secure, Dynamic and Distributed Access Control Stack for Database Applications., , and . SEKE, page 364-369. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2015)