|
Search the dblp DataBase
Weili Han:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Weili Han, Junjing Zhang, Xiaobo Yao
Context-sensitive Access Control Model and Implementation. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:757-763 [Conf]
- Xingdong Shi, Weili Han, Yinsheng Li, Ying Huang
Service-Oriented Business Solution Development Driven by Process Model. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:1086-1092 [Conf]
- Weili Han, Shuai Dianxun, Yujun Liu
Network Behavior Analysis Based on a Computer Network Model. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:418-421 [Conf]
- Yujun Liu, Shuai Dianxun, Weili Han
Network Self-Organizing Information Exploitation Model Based on GCA. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:327-334 [Conf]
An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model. [Citation Graph (, )][DBLP]
Research on an Event Specification for Event-Based Collaboration Support Software Architecture. [Citation Graph (, )][DBLP]
Anti-phishing based on automated individual white-list. [Citation Graph (, )][DBLP]
A Robust Detection of the Sybil Attack in Urban VANETs. [Citation Graph (, )][DBLP]
Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. [Citation Graph (, )][DBLP]
An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]
Search in 0.025secs, Finished in 0.025secs
|