Author of the publication

An Efficient Authorization Mechanism for Secure XML Sources on the Web.

, and . J. Adv. Comput. Intell. Intell. Informatics, 10 (5): 721-727 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML Access Control for Security and Memory Management., , and . INTELLCOMM, volume 190 of IFIP, page 179-189. Springer, (2005)An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 48-55. Springer, (2005)Static Type Assignment for SSA Form in CTOC., and . J. Inf. Process. Syst., 3 (1): 26-32 (2007)Design of HDTS System for Locating Logical Errors in Java Programs., , and . ACIS-ICIS, page 418-423. IEEE Computer Society, (2005)Access Control Technique for XML Documents., , , , and . International Conference on Internet Computing, page 129-135. CSREA Press, (2005)Design of Translator for generating Java Bytecode from Thread code of Multithreaded Models., , , and . PDPTA, CSREA Press, (2000)A Method for Acquiring Fingerprint by Linear Sensor., and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 410-416. Springer, (2005)Design of Flexible Authorization System and Small Memory Management for XML Data Protection on the Server., and . KES (1), volume 4251 of Lecture Notes in Computer Science, page 451-458. Springer, (2006)The Efficient Debugging System for Locating Logical Errors in Java Programs., and . ICCSA (1), volume 2667 of Lecture Notes in Computer Science, page 684-693. Springer, (2003)Separation Set Partitioning: Algorithm to Partition Nonstrict Programs into Sequential Threads., , and . HICSS (1), page 626-627. IEEE Computer Society, (1997)