Manachai Toahchoodee, Ph.D.
Affiliations: | 2010 | Computer Science | Colorado State University, Fort Collins, CO |
Area:
Computer ScienceGoogle:
"Manachai Toahchoodee"Parents
Sign in to add mentorIndrakshi Ray | grad student | 2010 | Colorado State | |
(Access control models for pervasive computing environments.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Toahchoodee M. (2016) HoVeR: The Holographic Visualizer on Raspberry Pi 2015 15th International Symposium On Communications and Information Technologies, Iscit 2015. 265-268 |
Toahchoodee M, Ray I. (2011) On the formalization and analysis of a spatio-temporal role-based access control model Journal of Computer Security. 19: 399-452 |
Georg G, Anastasakis K, Bordbar B, et al. (2010) Verification and trade-off analysis of security properties in UML system models Ieee Transactions On Software Engineering. 36: 338-356 |
Toahchoodee M, Ray I, Anastasakis K, et al. (2009) Ensuring spatio-temporal access control for real-world applications Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 13-22 |
Toahchoodee M, Ray I. (2009) Using Alloy to analyse a spatio-temporal access control model supporting delegation Iet Information Security. 3: 75-113 |
Georg G, Ray I, Anastasakis K, et al. (2009) An aspect-oriented methodology for designing secure applications Information and Software Technology. 51: 846-864 |
Toahchoodee M, Xie X, Ray I. (2009) Towards trustworthy delegation in role-based access control model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5735: 379-394 |
Toahchoodee M, Abdunabi R, Ray I. (2009) A trust-based access control model for pervasive computing applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5645: 307-314 |
Ray I, Toahchoodee M. (2008) A spatio-temporal access control model supporting delegation for pervasive computing applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5185: 48-58 |
Toahchoodee M, Ray I. (2008) On the formal analysis of a spatio-temporal role-based access control model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5094: 17-32 |