Author:
Nahar Kamrun,Gill Asif Qumer
Publisher
Springer International Publishing
Reference29 articles.
1. Ahn, G.-J., Ko, M., Shehab, M.: Privacy-enhanced user-centric identity management. In: 2009 IEEE International Conference on Communications, pp. 1–5. IEEE (2009)
2. Buffa, M., Faron-Zucker, C.: Ontology-based access rights management. In: Advances in Knowledge Discovery and Management, pp. 49–61. Springer, Berlin, (2012)
3. Choi, C., Choi, J., Kim, P.J.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711–722 (2014)
4. Corcho, O., Fernández-López, M., Gómez-Pérez, A.: Methodologies, tools and languages for building ontologies. Where is their meeting point? Data Knowl. Eng. 46(1), 41–64 (2003)
5. Falbo, R.D.A., Bertollo, G.J.: A software process ontology as a common vocabulary about software processes. Int. J. Bus. Process Integr. Manag. 4(4), 239–250 (2009)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献