|
Search the dblp DataBase
Baoyi Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Baoyi Wang, Shaomin Zhang
The Research on Role-Based Access Control Mechanism for Workflow Management System. [Citation Graph (0, 0)][DBLP] GCC, 2004, pp:729-736 [Conf]
- Baoyi Wang, Shaomin Zhang, Xiaodong Xia
The Application Research of Role-Based Access Control Model in Workflow Management System. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:1034-1037 [Conf]
- Shaomin Zhang, Baoyi Wang
Managing Access in Extended Enterprise Networks Web Service-Based. [Citation Graph (0, 0)][DBLP] GCC, 2004, pp:963-966 [Conf]
- Shaomin Zhang, Baoyi Wang, Lihua Zhou
Constructing Secure Web Service Based on XML. [Citation Graph (0, 0)][DBLP] GCC (1), 2003, pp:1051-1054 [Conf]
- Baoyi Wang, Shaomin Zhang
A Novel Text Classification Algorithm Based on Naïve Bayes and KL-Divergence. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:913-915 [Conf]
- Shaomin Zhang, Baoyi Wang
Research on Improved Role Hierarchy Model in Extended Organization PKI Networks. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:339-342 [Conf]
- Shaomin Zhang, Baoyi Wang
The Research on Decision Approach of Data Dependence in Dynamic Workflow System. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:1027-1029 [Conf]
- Shaomin Zhang, Xiaoyan Liang, Baoyi Wang
Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid. [Citation Graph (0, 0)][DBLP] SKG, 2006, pp:69- [Conf]
- Shaomin Zhang, Huitao Gong, Baoyi Wang
An Extended OCSP Protocol for Grid CA Cross-certification. [Citation Graph (0, 0)][DBLP] SKG, 2006, pp:105- [Conf]
- Shaomin Zhang, Baoyi Wang
Research on a Fine-grained Access Control Mechanism for Cross-domain Grid. [Citation Graph (0, 0)][DBLP] SKG, 2005, pp:94- [Conf]
- Baoyi Wang, Shaomin Zhang
An Organization and Task Based Access Control Model for Workflow System. [Citation Graph (0, 0)][DBLP] APWeb/WAIM Workshops, 2007, pp:485-490 [Conf]
Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System. [Citation Graph (, )][DBLP]
Study on Centralized Authorization Model Supporting Multiple Access Control Models. [Citation Graph (, )][DBLP]
History and Future Information Based Trust Model in C2C E-commerce. [Citation Graph (, )][DBLP]
Research on Gravity-Based Anomaly Intrusion Detection Algorithm. [Citation Graph (, )][DBLP]
Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. [Citation Graph (, )][DBLP]
A Novel Grid Trust Model Based on Fuzzy Theory. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|