07.06.2015 Views

السجل العلمي لمنتدى النزاهة العلمية

السجل العلمي لمنتدى النزاهة العلمية

السجل العلمي لمنتدى النزاهة العلمية

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

سجل ا<strong>لمنتدى</strong><br />

Access Control Framework for R-Osgi. The 2nd<br />

International Workshop on Database Technology<br />

.and Applications (DBTA) 1-5<br />

Zhao, L., Liu, S., Li, J. & Xu, H. 2010. A<br />

Dynamic Access Control Model Based on Trust.<br />

International Conference on Environmental Science<br />

and Information Application Technology (ES-<br />

.IAT), 548-551<br />

Organizations. Fifth International Conference on<br />

Grid and Cooperative Computing Workshops,<br />

.557-564<br />

Ma, J., Logrippo, L., Adi, K. & Mankovski,<br />

S. 2010. Risk Analysis in Access Control Systems<br />

Based on Trust Theories. IEEE/WIC/ACM International<br />

Conference on Web Intelligence and Intelli-<br />

.gent Agent Technology (WI-IAT), 415-418<br />

Farooqi, N. & North, S. 2011. Trust-Based<br />

Access Control for Xml Databases. The 6th International<br />

Conference for Internet Technology and<br />

Secured Transactions (ICITST-2011), Abu Dhabi,<br />

.UAE: IEEE Xplore, 764-765<br />

Farooqi, N. & North, S. 2012a. Evaluation<br />

of Practical Trust Based Access Control for Xml<br />

Databases. The 7th International Conference for<br />

Internet Technology and Secured Transactions<br />

.(ICITST), London, UK. IEEE Xplore, 336-340<br />

Farooqi, N. & North, S. 2012b. Logging<br />

in Xml Databases: Xlog File for Trust Based Access<br />

Control. World Congress on Internet Security<br />

(WorldCIS-2012), Ontario, Canad. IEEE Xplore,<br />

.174-175<br />

Farooqi, N. & North, S. 2013. Performance<br />

Evaluation of Trust Based Access Control<br />

for Xml Databases. The Journal of Internet Technology<br />

and Secured Transactions (JITST), Vol-<br />

.)ume 2, 147-156. ISSN 2046 3723 (Online<br />

Farooqi, N. & North, S. 2014. Time Cost<br />

Evaluation of Trust Based Access Control for XML<br />

Databases. The 9th International Conference for<br />

Internet Technology and Secured Transactions<br />

.(ICITST), London, UK. IEEE Xplore, 324-426<br />

Feng, F., Lin, C., Peng, D. & Li, J. 2008.<br />

A Trust and Context Based Access Control Model<br />

for Distributed Systems. 10th IEEE International<br />

Conference on High Performance Computing and<br />

.Communications, 629-634<br />

Singh, S. 2011. Trust Based Authorization<br />

Framework for Grid Services. Journal of Emerging<br />

Trends in Computing and Information Sciences, 2,<br />

.136-144<br />

Xing, H.F., Cui, B.L. & Xu, L.L. 2010. A<br />

Mixed Access Control Method Based on Trust and<br />

Role. The Second IITA International Conference<br />

.on Geoscience and Remote Sensing 552-555<br />

Zhang, L. & Rao, R. 2010. Trust Based<br />

221<br />

5 - 6 May 2015<br />

- ١٦ ١٧ رجب ١٤٣٦ ه /

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!