Author of the publication

Towards Enhancing Programming Self-Efficacy Perceptions among Undergraduate Information Systems Students.

, , and . J. Inf. Technol. Educ. Res., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rigorous Analysis of Temporal Access Control Properties in Mobile Systems., , , and . ICECCS, page 246-251. IEEE Computer Society, (2013)Specification and analysis of access control policies for mobile applications., , and . SACMAT, page 173-184. ACM, (2013)An Approach to Analyzing Temporal Properties in UML Class Models., , , and . MoDeVVa@MoDELS, volume 1069 of CEUR Workshop Proceedings, page 77-86. CEUR-WS.org, (2013)Secure Access Control for Healthcare Information Systems: A Body Area Network Perspective., , and . CCWC, page 1036-1045. IEEE, (2023)Enforcing spatio-temporal access control in mobile applications., , and . Computing, 96 (4): 313-353 (2014)Towards Enhancing Programming Self-Efficacy Perceptions among Undergraduate Information Systems Students., , and . J. Inf. Technol. Educ. Res., (2019)Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach., , and . DSA, page 302-311. IEEE, (2023)Access Control for Internet of Things Applications., , and . CPSS@AsiaCCS, page 35-36. ACM, (2019)A Trust-Based Access Control Model for Pervasive Computing Applications., , , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 307-314. Springer, (2009)Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model., , , and . IEEE Syst. J., 7 (3): 501-515 (2013)