Year | DOI | Venue |
---|---|---|
2014 | 10.4304/jnw.9.8.2079-2088 | JNW |
Keywords | Field | DocType |
role based access control,network models | Graph theory,Data mining,Expression (mathematics),Computer science,Correctness,Role-based access control,Information security,Access control,Network model,Semantics | Journal |
Volume | Issue | Citations |
9 | 8 | 1 |
PageRank | References | Authors |
0.34 | 18 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
L Dong | 1 | 210 | 30.65 |
Jinxia Wu | 2 | 8 | 2.23 |
Cheng Gong | 3 | 7 | 2.47 |
Benjie Pi | 4 | 1 | 0.68 |