Author of the publication

Access Control Model Based on Trust and Risk Evaluation in IDMaaS.

, , , and . ITNG, page 179-184. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PassApp: My App is My Password!, , , , and . MobileHCI, page 306-315. ACM, (2015)PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records., , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 166-176. Springer, (2020)CQArank: jointly model topics and expertise in community question answering., , , , , , and . CIKM, page 99-108. ACM, (2013)Lightweight RFID Mutual Authentication Protocol against Feasible Problems., , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)ESUM: an efficient UTXO schedule model., , , , and . ICBC, page 1-3. IEEE, (2022)Access Control Model Based on Trust and Risk Evaluation in IDMaaS., , , and . ITNG, page 179-184. IEEE Computer Society, (2015)OverlapShard: Overlap-based Sharding Mechanism., , , and . ISCC, page 1-7. IEEE, (2021)An Improved Scheme for Delegation Based on Usage Control., , , , and . FGCN (1), page 74-78. IEEE Computer Society, (2008)HoneyHash: Honeyword Generation Based on Transformed Hashes., and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 161-173. Springer, (2020)A Game Theoretic Approach Based Access Control Mechanism., , , , and . ICYCS, page 1464-1469. IEEE Computer Society, (2008)