السجل العلمي لمنتدى النزاهة العلمية
السجل العلمي لمنتدى النزاهة العلمية
السجل العلمي لمنتدى النزاهة العلمية
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
سجل ا<strong>لمنتدى</strong><br />
Access Control Framework for R-Osgi. The 2nd<br />
International Workshop on Database Technology<br />
.and Applications (DBTA) 1-5<br />
Zhao, L., Liu, S., Li, J. & Xu, H. 2010. A<br />
Dynamic Access Control Model Based on Trust.<br />
International Conference on Environmental Science<br />
and Information Application Technology (ES-<br />
.IAT), 548-551<br />
Organizations. Fifth International Conference on<br />
Grid and Cooperative Computing Workshops,<br />
.557-564<br />
Ma, J., Logrippo, L., Adi, K. & Mankovski,<br />
S. 2010. Risk Analysis in Access Control Systems<br />
Based on Trust Theories. IEEE/WIC/ACM International<br />
Conference on Web Intelligence and Intelli-<br />
.gent Agent Technology (WI-IAT), 415-418<br />
Farooqi, N. & North, S. 2011. Trust-Based<br />
Access Control for Xml Databases. The 6th International<br />
Conference for Internet Technology and<br />
Secured Transactions (ICITST-2011), Abu Dhabi,<br />
.UAE: IEEE Xplore, 764-765<br />
Farooqi, N. & North, S. 2012a. Evaluation<br />
of Practical Trust Based Access Control for Xml<br />
Databases. The 7th International Conference for<br />
Internet Technology and Secured Transactions<br />
.(ICITST), London, UK. IEEE Xplore, 336-340<br />
Farooqi, N. & North, S. 2012b. Logging<br />
in Xml Databases: Xlog File for Trust Based Access<br />
Control. World Congress on Internet Security<br />
(WorldCIS-2012), Ontario, Canad. IEEE Xplore,<br />
.174-175<br />
Farooqi, N. & North, S. 2013. Performance<br />
Evaluation of Trust Based Access Control<br />
for Xml Databases. The Journal of Internet Technology<br />
and Secured Transactions (JITST), Vol-<br />
.)ume 2, 147-156. ISSN 2046 3723 (Online<br />
Farooqi, N. & North, S. 2014. Time Cost<br />
Evaluation of Trust Based Access Control for XML<br />
Databases. The 9th International Conference for<br />
Internet Technology and Secured Transactions<br />
.(ICITST), London, UK. IEEE Xplore, 324-426<br />
Feng, F., Lin, C., Peng, D. & Li, J. 2008.<br />
A Trust and Context Based Access Control Model<br />
for Distributed Systems. 10th IEEE International<br />
Conference on High Performance Computing and<br />
.Communications, 629-634<br />
Singh, S. 2011. Trust Based Authorization<br />
Framework for Grid Services. Journal of Emerging<br />
Trends in Computing and Information Sciences, 2,<br />
.136-144<br />
Xing, H.F., Cui, B.L. & Xu, L.L. 2010. A<br />
Mixed Access Control Method Based on Trust and<br />
Role. The Second IITA International Conference<br />
.on Geoscience and Remote Sensing 552-555<br />
Zhang, L. & Rao, R. 2010. Trust Based<br />
221<br />
5 - 6 May 2015<br />
- ١٦ ١٧ رجب ١٤٣٦ ه /