Author of the publication

Building access control policy model for privacy preserving and testing policy conflicting problems.

, , and . J. Comput. Syst. Sci., 80 (8): 1493-1503 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Chinese Students' Perspective on Reference Services at Chinese Academic Libraries: A Case Study Approach, and . The Journal of Academic Librarianship, 41 (3): 228 - 235 (2015)Octopus: efficient data intensive computing on virtualized datacenters., , , , and . SYSTOR, page 3:1-3:11. ACM, (2013)User-Oriented Energy-Saving Offloading for Wireless Virtualization Aided Mobile Edge Computing., , and . CSAE, page 51:1-51:5. ACM, (2018)An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment, , , and . International Journal of Accounting Information Systems, 10 (2): 65-78 (2009)SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback., , , and . ICDE, page 1364-1367. IEEE Computer Society, (2013)An ASN.1 UPER Encoding Based Fuzzing Method for Radio Resource Control Protocol., , , , , , , , and . NaNA, page 268-273. IEEE, (2023)Analysis on the Application of Dense Storage Technology in Logistics Based on the IoT., , , and . CSE/EUC (2), page 214-218. IEEE Computer Society, (2017)Research on, and Development of, Data Extraction and Data Cleaning Technology Based on the Internet of Things., , and . CSE/EUC (2), page 332-341. IEEE Computer Society, (2017)New visual feedback guidance of a mobile robot via vanishing point., and . RAM, page 153-158. IEEE, (2004)Research on the Application of RFID Technology in Logistics Warehousing Management System., , , , and . ICA3PP (Workshops), volume 11338 of Lecture Notes in Computer Science, page 158-164. Springer, (2018)