Author of the publication

Trust-Based Fuzzy Access Control Model Research.

, , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 393-399. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Middleware for Highly Dynamic Distribution in CPS Environment., and . ICCASA, page 169-172. ACM, (2014)An approach to automatic testing exception handling., , , and . ACM SIGPLAN Notices, 40 (8): 34-39 (2005)Data and knowledge mining with big data towards smart production., , , , and . J. Ind. Inf. Integr., (2018)Manufacturing service supply-demand optimization with dual diversities for industrial internet platforms., , , and . Comput. Ind. Eng., (2021)Inter-Cell Interference Management in LTE-A Small-Cell Networks., , , , , and . VTC Spring, page 1-6. IEEE, (2013)Application-level Solution for Data integration in Ubiquitous Computing Environment., , and . J. Digit. Inf. Manag., 9 (6): 233-241 (2011)Long/Short-Term Utility Aware Optimal Selection of Manufacturing Service Composition Toward Industrial Internet Platforms., , , , , and . IEEE Trans. Ind. Informatics, 15 (6): 3712-3722 (2019)Fractal analysis and control in the predator-prey model., , and . Int. J. Comput. Math., 94 (4): 737-746 (2017)Pilot Assignment in Cell-Free Massive MIMO Based on the Hungarian Algorithm., , , , and . IEEE Wirel. Commun. Lett., 10 (1): 34-37 (2021)Control and Synchronization of Julia Sets in the Forced Brusselator Model., and . Int. J. Bifurc. Chaos, 25 (9): 1550113:1-1550113:12 (2015)