The SCEAS System
Navigation Menu

Search the dblp DataBase


Weider D. Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Weider D. Yu, Archana Mansukhani
    A reusable intelligent authorization design for web services software security. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:298-303 [Conf]
  2. Weider D. Yu, Dhanya Aravind, Passarawarin Supthaweesuk
    Software Vulnerability Analysis for Web Services Software Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:740-748 [Conf]
  3. Weider D. Yu, Ellora Nayak
    ARSL: A Language for Authorization Rule Specification in Software Security. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:54-62 [Conf]
  4. Weider D. Yu, Sharanya Doddapaneni, Savitha Murthy
    A Privacy Assessment Approach for Serviced Oriented Architecture Application. [Citation Graph (0, 0)][DBLP]
    SOSE, 2006, pp:67-75 [Conf]
  5. Weider D. Yu
    A Modeling Approach to Software Cost Estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:2, pp:309-314 [Journal]
  6. Weider D. Yu, Sunita Sharma
    A Mobile Database Design Methodology for Mobile Software Solutions. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:121-130 [Conf]

  7. An Algorithmic Approach to Authorization Rules Conflict Resolution in Software Security. [Citation Graph (, )][DBLP]

  8. PhishCatch - A Phishing Detection Tool. [Citation Graph (, )][DBLP]

  9. An Approach of Mobile Database Design Methodology for Mobile Software Solutions. [Citation Graph (, )][DBLP]

  10. The Design and Implementation of A Search Engine Marketing Management System (SEMMS) Based on Service-Oriented Architecture Platform. [Citation Graph (, )][DBLP]

  11. A SOA Based Software Engineering Design Approach in Service Engineering. [Citation Graph (, )][DBLP]

  12. A Workflow-Based Test Automation Framework for Web Based Systems. [Citation Graph (, )][DBLP]

  13. PPMLP: A Special Modeling Language Processor for Privacy Policies. [Citation Graph (, )][DBLP]

  14. A phishing vulnerability analysis of web based systems. [Citation Graph (, )][DBLP]

  15. Towards a Wireless Mobile Social Network System Design in Healthcare. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002