Author of the publication

Towards an Approach of Semantic Access Control for Cloud Computing.

, , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 145-156. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SHMA: 一种云平台的监控框架 (SHMA: Monitoring Architecture for Clouds)., , and . 计算机科学, 44 (1): 7-12 (2017)Automatically Identifying Calling-Prone Higher-Order Functions of Scala Programs to Assist Testers., , , , and . J. Comput. Sci. Technol., 35 (6): 1278-1294 (2020)Deep Neural Networks for Quantitative Damage Evaluation of Building Losses Using Aerial Oblique Images: Case Study on the Great Wall (China)., , , , , and . Remote. Sens., 13 (7): 1321 (2021)Deep Neural Networks for Road Sign Detection and Embedded Modeling Using Oblique Aerial Images., , , , , and . Remote. Sens., 13 (5): 879 (2021)Mining the use of higher-order functions., , , , and . Empir. Softw. Eng., 25 (6): 4547-4584 (2020)Towards an Approach of Semantic Access Control for Cloud Computing., , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 145-156. Springer, (2009)Robust Line Matching for Image Sequences Based on Point Correspondences and Line Mapping., , , , and . IEEE Access, (2019)Writing Tests for This Higher-Order Function First: Automatically Identifying Future Callings to Assist Testers., , and . Internetware, page 6:1-6:10. ACM, (2019)Clone Detection on Large Scala Codebases., , , , , , , , , and . IWSC, page 38-44. IEEE, (2020)Multi-Objective Configuration Sampling for Performance Ranking in Configurable Systems., , , and . APSEC, page 150-157. IEEE, (2019)