|
Search the dblp DataBase
Gansen Zhao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gansen Zhao, Sassa Otenko, David W. Chadwick
Distributed Key Management for Secure Role based Messaging. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:132-137 [Conf]
- Gansen Zhao, David Chadwick, Sassa Otenko
Obligations for Role Based Access Control. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:424-431 [Conf]
- Xinming Wang, Gansen Zhao, Xin Zhang, Beihong Jin
An Agent-Based Model For Web Services Transaction Processing. [Citation Graph (0, 0)][DBLP] EEE, 2005, pp:186-189 [Conf]
- Gansen Zhao, David W. Chadwick
Evolving Messaging Systems for Secure Role Based Messaging. [Citation Graph (0, 0)][DBLP] ICECCS, 2005, pp:216-223 [Conf]
- Gansen Zhao, David W. Chadwick
Trust Infrastructure for Policy based Messaging In Open Environments. [Citation Graph (0, 0)][DBLP] WETICE, 2005, pp:144-149 [Conf]
How to Securely Break into RBAC: The BTG-RBAC Model. [Citation Graph (, )][DBLP]
Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. [Citation Graph (, )][DBLP]
On the Modeling of Bell-LaPadula Security Policies Using RBAC. [Citation Graph (, )][DBLP]
A Role-Based Access Control Model for Complex Affairs. [Citation Graph (, )][DBLP]
Cloud Computing: A Statistics Aspect of Users. [Citation Graph (, )][DBLP]
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. [Citation Graph (, )][DBLP]
Deployment models: Towards eliminating security concerns from cloud computing. [Citation Graph (, )][DBLP]
PERMIS: a modular authorization infrastructure. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|