Author of the publication

Access Control Policy Management Framework based on RBAC in OSGi Service Platform.

, , , and . CIT, page 161. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control Policy Management Framework based on RBAC in OSGi Service Platform., , , and . CIT, page 161. IEEE Computer Society, (2006)Design and Implementation of an SSL Component Based on CBD., , , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 478-486. Springer, (2004)Privacy-preserving similarity measurement for access control policies., , and . Digital Identity Management, page 3-12. ACM, (2010)User Privacy Enhanced Access Control Model in Social Network Environment., , , and . SWWS, page 128-133. CSREA Press, (2009)An anonymous communication model for privacy-enhanced location based service using an echo agent., , , and . ICUIMC, page 290-297. ACM, (2009)A database synchronization algorithm for mobile devices., , , , and . IEEE Trans. Consumer Electronics, 56 (2): 392-398 (2010)Home gateway operating model using reference monitor for enhanced user comfort and privacy., , and . IEEE Trans. Consumer Electronics, 54 (2): 494-500 (2008)A Novel Search System for Protecting Search Word., , and . IMIS, page 22-28. IEEE Computer Society, (2012)Database Security System for Applying Sophisticated Access Control via Database Firewall Server., , , and . Comput. Informatics, 32 (6): 1192-1211 (2013)A Database Firewall Server Using Data Masking., , , , and . Security and Management, page 291-296. CSREA Press, (2009)