Author of the publication

Managing Risks in RBAC Employed Distributed Environments.

, , , and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1548-1566. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Compression Performance of Turkish Text with PoS Tags., and . IKE, page 519-523. CSREA Press, (2004)Experiments on A Secure Compression Algorithm., and . ITCC (2), page 150-152. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Query Processing Techniques for Compliance with Data Confidence Policies., , , , , and . Secure Data Management, volume 5776 of Lecture Notes in Computer Science, page 49-67. Springer, (2009)A Security Embedded Text Compression Algorithm., and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 187-195. Springer, (2003)Parallel performance of DES in ECB mode., , and . ISCN, page 134-139. IEEE, (2006)Language Discrimination via PPM Model.. ITCC (1), page 57-62. IEEE Computer Society, (2005)A Preprocessor Adding Security to and Improving the Performances of Arithmetic and Huffman Codings., and . ADVIS, volume 3261 of Lecture Notes in Computer Science, page 420-419. Springer, (2004)Investigating the Effects of Recency and Size of Training Text on Author Recognition Problem., and . ISCIS, volume 3280 of Lecture Notes in Computer Science, page 21-30. Springer, (2004)A Cryptographic Approach to Language Identification: PPM.. ICEIS (2), page 213-219. (2005)Word-Based Fixed and Flexible List Compression., , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 780-790. Springer, (2005)