default search action
Shih-Chien Chou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j34]Shih-Chien Chou, Jin-Yuan Jhu:
Embedding Access Control Policy in Web Service Path Composition Algorithm. J. Inf. Sci. Eng. 27(6): 1839-1853 (2011) - [c7]Shih-Chien Chou:
Using Partial Ordered Numbers to Control Information Flows. SSIRI 2011: 60-69 - 2010
- [j33]Shih-Chien Chou, Chun-Hao Huang:
An extended XACML model to ensure secure information access for web services. J. Syst. Softw. 83(1): 77-84 (2010)
2000 – 2009
- 2009
- [j32]Shiow-Yang Wu, Shih-Chien Chou:
Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation. J. Inf. Sci. Eng. 25(6): 1921-1937 (2009) - 2007
- [j31]Shih-Chien Chou, Chia-Wei Lai:
An Information Flow Control Model for Both Object-Oriented and Non-Object-Oriented Systems. J. Inf. Sci. Eng. 23(2): 479-496 (2007) - [j30]Shih-Chien Chou:
Managing User Associations and the Factors of Laws and Cultures in an Information Flow Control Model for Object-Oriented Systems. J. Inf. Sci. Eng. 23(3): 949-961 (2007) - 2006
- [j29]Shih-Chien Chou, Wei-Kuang Lo, Chia-Wei Lai:
Information flow control in multithread applications based on access control lists. Inf. Softw. Technol. 48(8): 717-725 (2006) - [j28]Shih-Chien Chou, Yuan-Chien Chen:
Retrieving reusable components with variation points from software product lines. Inf. Process. Lett. 99(3): 106-110 (2006) - [j27]Shih-Chien Chou:
MRBAC/AR: an Information Flow Control Model to Prevent Both Intra- and Inter-Application Information Leakage. J. Inf. Sci. Eng. 22(1): 147-161 (2006) - [j26]Shih-Chien Chou, Yuan-Chien Chen:
Managing role relationships in an information flow control model. J. Syst. Softw. 79(4): 507-522 (2006) - 2005
- [j25]Shih-Chien Chou, Chia-Wei Lai:
Secure Access of Products in a Process Environment. IEICE Trans. Inf. Syst. 88-D(2): 197-203 (2005) - [j24]Shih-Chien Chou:
ADPE: Agent-Based Decentralized Process Engine. IEICE Trans. Inf. Syst. 88-D(3): 603-609 (2005) - [j23]Shih-Chien Chou:
An RBAC-Based Access Control Model for Object-Oriented Systems Offering Dynamic Aspect Features. IEICE Trans. Inf. Syst. 88-D(9): 2143-2147 (2005) - [j22]Shih-Chien Chou, Chien-Jung Wu:
A Coordinator for Workflow Management Systems with Information Access Control. IEICE Trans. Inf. Syst. 88-D(12): 2786-2792 (2005) - [j21]Shih-Chien Chou, An-Feng Liu, Chien-Jung Wu:
Preventing information leakage within workflows that execute among competing organizations. J. Syst. Softw. 75(1-2): 109-123 (2005) - [j20]Shih-Chien Chou:
An agent-based inter-application information flow control model. J. Syst. Softw. 75(1-2): 179-187 (2005) - [j19]Shih-Chien Chou, Wei-Chuan Hsu, Wei-Kuang Lo:
DPE/PAC: decentralized process engine with product access control. J. Syst. Softw. 76(3): 207-219 (2005) - [j18]Shih-Chien Chou, Chin-Yi Chang:
An information flow control model for C applications based on access control lists. J. Syst. Softw. 78(1): 84-100 (2005) - [c6]Yih-Cheng Lee, Chi-Ming Ma, Shih-Chien Chou:
A Service-Oriented Architecture for Design and Development of Middleware. APSEC 2005: 217-221 - [c5]Shih-Chien Chou:
ADPE: agent-based decentralized process engine. ISADS 2005: 405-412 - 2004
- [j17]Shih-Chien Chou:
Retrieving Correlated Software Products for Reuse. IEICE Trans. Inf. Syst. 87-D(1): 175-182 (2004) - [j16]Shih-Chien Chou, Ying-Kai Wen:
Association-Based Information Flow Control In Object-Oriented Systems. Int. J. Softw. Eng. Knowl. Eng. 14(3): 291-322 (2004) - [j15]Shih-Chien Chou:
DPEM: a decentralized software process enactment model. Inf. Softw. Technol. 46(6): 383-395 (2004) - [j14]Shih-Chien Chou:
Dynamic adaptation to object state change in an information flow control model. Inf. Softw. Technol. 46(11): 729-737 (2004) - [j13]Shih-Chien Chou, Chun-Wei Huang:
A Software Product Model Emphasizing Relationships. J. Inf. Sci. Eng. 20(2): 349-377 (2004) - [j12]Shih-Chien Chou:
LnRBAC: A Multiple-Levelled Role-Based Access Control Model for Protecting Privacy in Object-Oriented Systems. J. Object Technol. 3(3): 91-120 (2004) - [j11]Shih-Chien Chou:
Embedding role-based access control model in object-oriented systems to protect privacy. J. Syst. Softw. 71(1-2): 143-161 (2004) - [j10]Shih-Chien Chou:
Providing flexible access control to an information flow control model. J. Syst. Softw. 73(3): 425-439 (2004) - 2003
- [c4]Shih-Chien Chou:
Information Flow Control among Objects: Taking Foreign Objects into Control. HICSS 2003: 335 - 2002
- [j9]Shih-Chien Chou:
ProActNet: Modeling Processes Through Activity Networks. Int. J. Softw. Eng. Knowl. Eng. 12(5): 545-580 (2002) - [j8]Shih-Chien Chou:
A Process Modeling Language Consisting of High Level UML-based Diagrams and Low Level Process Language. J. Object Technol. 1(4): 137-163 (2002) - 2001
- [c3]Shih-Chien Chou, Chun-Wei Huang:
A Software Product Model Emphasizing Relationships. APAQS 2001: 417-426 - 2000
- [j7]Shih-Chien Chou, Jason Jen-Yen Chen:
Process program change control in a process environment. Softw. Pract. Exp. 30(3): 175-197 (2000) - [c2]Jason Jen-Yen Chen, Shih-Chien Chou, W.-C. Liu:
APER-2: A Developer-centered, Object-oriented Process Language. ISMSE 2000: 297-303
1990 – 1999
- 1999
- [j6]Jason Jen-Yen Chen, Shih-Chien Chou:
A Two-Leveled Classification and Retrieval Technique for Process Program Reuse. Int. J. Artif. Intell. Tools 8(2): 179-191 (1999) - [j5]Shih-Chien Chou, Jason Jen-Yen Chen:
Process evolution support in concurrent software process language environment. Inf. Softw. Technol. 41(8): 507-524 (1999) - [j4]Jason Jen-Yen Chen, Shih-Chien Chou:
Consistency management in a process environment. J. Syst. Softw. 47(2-3): 105-110 (1999) - 1998
- [j3]Jason Jen-Yen Chen, Shih-Chien Chou:
Enacting object-oriented methods by a process environment. Inf. Softw. Technol. 40(5-6): 311-325 (1998) - 1996
- [j2]Shih-Chien Chou, Jason Jen-Yen Chen, Chian-Goei Chung:
An executable specification language for specification understanding in object-oriented specification reuse. Inf. Softw. Technol. 38(6): 419-434 (1996) - [j1]Shih-Chien Chou, Jason Jen-Yen Chen, Chian-Goei Chung:
A Behavior-Based Classification and Retrieval Technique for Object-Oriented Specification Reuse. Softw. Pract. Exp. 26(7): 815-832 (1996) - 1994
- [c1]Shih-Chien Chou, Chyan-Goei Chung:
An OOA model with system function specifications. ICRE 1994: 16-23
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint