Author of the publication

Role Based Access Control in Distributed Object Systems.

, and . ICDCS Workshops, page 24-29. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probability and topic-based data transmission protocol., , , and . Concurr. Comput. Pract. Exp., (2021)An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas., , and . J. High Speed Networks, 28 (3): 181-203 (2022)Energy-Efficient Server Clusters to Perform Communication Type Application Processes., , and . J. Supercomput., 69 (3): 1087-1102 (2014)Energy-Efficient Quorum-Based Locking Protocol in Virtual Machine Environments., and . CISIS, volume 1194 of Advances in Intelligent Systems and Computing, page 22-30. Springer, (2020)TMPR-scheme for reliably broadcast messages among peer processes., , and . Int. J. Grid Util. Comput., 2 (3): 175-182 (2011)A Dynamic Network-Based Fog Computing Model for Energy-Efficient IoT., , , , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 94-104. Springer, (2020)Topic-Based Processing Protocol in a Mobile Fog Computing Model., , , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 43-53. Springer, (2020)Purpose-Based Information Flow Control for Cyber Engineering., and . IEEE Trans. Ind. Electron., 58 (6): 2216-2225 (2011)An energy-aware algorithm to migrate virtual machines in a server cluster., , and . Int. J. Space Based Situated Comput., 7 (1): 32-42 (2017)A read-write abortion protocol to prevent illegal information flow in role-based access control systems., , , and . Int. J. Space Based Situated Comput., 6 (1): 43-53 (2016)