Author of the publication

Combinatorial Testing of Full Text Search in Web Applications.

, , and . QRS Companion, page 100-107. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet., , and . ACM Trans. Inf. Syst. Secur., 2 (1): 34-64 (1999)Proposed NIST standard for role-based access control., , , , and . ACM Trans. Inf. Syst. Secur., 4 (3): 224-274 (2001)A Survey of Binary Covering Arrays., , , , and . Electron. J. Comb., (2011)Measuring Combinatorial Coverage at Adobe., , , , , and . ICST Workshops, page 194-197. IEEE, (2019)RBAC Standard Rationale: Comments on Ä Critique of the ANSI Standard on Role-Based Access Control"., , and . IEEE Secur. Priv., 5 (6): 51-53 (2007)Combinatorial and MC/DC Coverage Levels of Random Testing., , , and . QRS Companion, page 61-68. IEEE, (2017)Detecting Vulnerabilities in Android Applications using Event Sequences., , and . QRS, page 159-166. IEEE, (2019)A quantum cryptographic protocol with detection of compromised server.. Quantum Inf. Comput., 5 (7): 551-560 (2005)