Search the dblp DataBase
Cungang Yang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Celia Li , Cungang Yang , Richard Cheung Key Management for Role Hierarchy in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:293-302 [Conf ] Cungang Yang , Chang N. Zhang Secure Web-based Applications with XML and RBAC. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:276-281 [Conf ] Cungang Yang , Chang N. Zhang A Privacy Enhanced Role-Based Access Control Model for Enterprises. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1012-1021 [Conf ] Cungang Yang , Chang N. Zhang An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2003, pp:646-649 [Conf ] Cungang Yang , Chang N. Zhang An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model. [Citation Graph (0, 0)][DBLP ] SAC, 2003, pp:302-306 [Conf ] Cungang Yang , Chang N. Zhang Designing Secure E-Commerce with Role-based Access Control. [Citation Graph (0, 0)][DBLP ] CEC, 2003, pp:313-319 [Conf ] Chang N. Zhang , Cungang Yang An Object-Oriented RBAC Model for Distributed System. [Citation Graph (0, 0)][DBLP ] WICSA, 2001, pp:24-0 [Conf ] Cungang Yang , Celia Li Access control in a hierarchy using one-way hash functions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:8, pp:659-664 [Journal ] Cungang Yang , Chang N. Zhang An XML-based administration method on role-based access control in the enterprise environment. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:5, pp:249-257 [Journal ] Chang N. Zhang , Cungang Yang Information flow analysis on role-based access control model. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:5, pp:225-236 [Journal ] Cungang Yang , Celia Li , Chang N. Zhang An XML-Based Administration Method on Role-Based Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] I. J. Comput. Appl., 2004, v:11, n:2, pp:98-105 [Journal ] Cungang Yang , Chang N. Zhang An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2006, v:22, n:1, pp:49-61 [Journal ] Chang N. Zhang , Cungang Yang Designing a Complete Model of Role-based Access Control System for Distributed Networks. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:6, pp:871-889 [Journal ] Celia Li , Cungang Yang , Richard Cheung Key management for role hierarchy in distributed systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:920-936 [Journal ] Location-based design for secure and efficient wireless sensor networks. [Citation Graph (, )][DBLP ] M-CLIQUES: Modified CLIQUES key agreement for secure multicast. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs