Author of the publication

Extended Role Based Access Control and Procedural Restrictions.

, , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factors Affecting the Use of Facial-Recognition Payment: An Example of Chinese Consumers., and . IEEE Access, (2019)Practical firewall policy inspection using anomaly detection and its visualization., , , , and . Multimedia Tools Appl., 71 (2): 627-641 (2014)The scheme of 3-level authentication mechanism for preventing internal information leakage., , , and . DICTAP, page 154-157. IEEE, (2014)Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel., , , and . PRDC, page 299-303. IEEE Computer Society, (2001)Extended Role Based Access Control and Procedural Restrictions., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization., , , and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 629-639. Springer, (2011)The effect of customers' perceived benefits on virtual brand community loyalty., and . Online Inf. Rev., 40 (3): 298-315 (2016)Multiple Sluicing in English., and . PACLIC, The Korean Society for Language and Information / ACL, (2007)