Author of the publication

Web Document Access Control Using Two-Layered Storage Structures with RBAC Server.

, and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 220-227. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Optimistic Concurrency Control in Valid XML., , and . J. Inf. Sci. Eng., 25 (1): 11-31 (2009)Task-role-based access control model., and . Inf. Syst., 28 (6): 533-562 (2003)Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems., , and . DBSec, volume 113 of IFIP Conference Proceedings, page 229-244. Chapman & Hall, (1997)An Efficient Yet Secure XML Access Control Enforcement by Safe and Correct Query Modification., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 276-285. Springer, (2006)Efficient labeling scheme of XML data considering update operations., and . CIT, page 438-443. IEEE Computer Society, (2008)Correction to: Efficient methods for finding an optimal network location for travel planning., and . J. Supercomput., 77 (11): 12581 (2021)Efficient methods for finding an optimal network location for travel planning., and . J. Supercomput., 77 (11): 12561-12580 (2021)Improving Korean verb-verb morphological disambiguation using lexical knowledge from unambiguous unlabeled data and selective web counts., , , and . Pattern Recognit. Lett., 33 (1): 62-70 (2012)Scalable and efficient web services composition based on a relational database., , , , and . J. Syst. Softw., 84 (12): 2139-2155 (2011)An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries., , and . IEICE Trans. Inf. Syst., 91-D (8): 2124-2133 (2008)