Author of the publication

A Formal Virtual Enterprise Access Control Model.

, , and . IEEE Trans. Syst. Man Cybern. Part A, 38 (4): 832-851 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability-based error detection for feedback communication with low latency., , and . ISIT, page 2552-2556. IEEE, (2013)Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise., , , and . Comput. Ind., 58 (1): 57-73 (2007)A two-dimensional knowledge authorization evaluation method enabling inter-enterprise knowledge sharing., , , and . Comput. Ind. Eng., (2017)Increasing flash memory lifetime by dynamic voltage allocation for constant mutual information., , and . ITA, page 1-5. IEEE, (2014)Capacity of Gaussian Many-Access Channels., , and . IEEE Trans. Inf. Theory, 63 (6): 3516-3539 (2017)On a method for location and mobility analytics using location-based services: a case study of retail store recommendation., , and . Online Inf. Rev., 45 (2): 297-315 (2021)A Business Model Feasibility Evaluation Method for Enterprise Collaborative Business Innovation.. Int. J. e Collab., 18 (1): 1-19 (2022)A Machine Learning-Based Anomaly Detection Method and Blockchain-Based Secure Protection Technology in Collaborative Food Supply Chain., , and . Int. J. e Collab., 19 (1): 1-24 (2023)The Relationship between User's Preference and Social Role in Instant Messaging Application - Taking LINE's Stickers as an Example., and . ICKII, page 331-334. IEEE, (2018)Is feedback a performance equalizer of classic and modern codes?, , and . ITA, page 428-432. IEEE, (2010)