Publications

Export 583 results:
Sort by: Author Title Type [ Year  (Desc)]
2014
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, no. 8, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014): IEEE Explore, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "XML Access Control: Mapping XACML Policies to Relational Database Tables", IAJIT, vol. 11, no. 6, pp. 9, 2014. Abstract
n/a
2013
Abd El-Aziz, A. A., and A. Kannan, "A Comprehensive Presentation to XML Signature and Encryption", In the Proceedings of the 3rd International Conference on Recent Trends in Information Technology (ICRTIT 2013). IEEE Xplore: IEEE Xplore, 2013. Abstract

n/a