Follow
Worachet Uttha
Worachet Uttha
Other namesวรเชษฐ์ อุทธา
Nakhon Pathom Rajabhat University
Verified email at webmail.npru.ac.th - Homepage
Title
Cited by
Cited by
Year
Automated analysis of rule-based access control policies
C Bertolissi, W Uttha
Proceedings of the 7th workshop on Programming languages meets program …, 2013
172013
Modeling authorization policies for Web Services in presence of transitive dependencies
W Uttha, C Bertolissi, S Ranise
2015 12th International Joint Conference on e-Business and …, 2015
42015
Towards a Reference Architecture for Access Control in Distributed Web Applications.
W Uttha, C Bertolissi, S Ranise
ESSoS Doctoral Symposium, 2014
32014
Enhancing security in the cloud: When traceability meets access control
C Bertolissi, O Boucelma, W Uttha
2017 12th International Conference for Internet Technology and Secured …, 2017
22017
Spécification et vérification des politiques de sécurité basées sur la réécritur
W UTTHA
Master’s thesis, Université d’Aix-Marseille. http://pageperso. lif. univ-mrs …, 2012
22012
Etude des politiques de sécurité pour les applications distribuées: le problème des dépendances transitives: modélisation, vérification et mise en oeuvre
W Uttha
Aix-Marseille, 2016
12016
Enhancing Line Chatbot Experiences: Utilizing Thai Question-Answering Systems to Enrich Dialogue with Unpredictable Questions
W Uttha
Interdisciplinary Research Review 19 (1), 2024
2024
The Recommended Application of the Singlet on Design Pattern in Software Development for Database Connectivity
WU Naruapon Suwanwijit, Somkiat Chormuan
The 15th National Conference onInformation Technology (NCIT2023), 2023
2023
The Development of Online Platform for Finding Travelling Companions
K Phuangwatpho, C Buakhaw, Y Santiekachun, N Seafong, S Sae-lim, ...
The 14th NPRU National Academic Conference Nakhon Pathom Rajabhat University, 2022
2022
A comparative method in moblie application code conversion between Java and Kotlin
N SUWANWUIT, W UTTHA
Nakhon Pathom Rajabhat University, 2020
2020
Etude des politiques de sécurité pour les applications distribuées: le problème des dépendances transitives
W Uttha
2016
Service Measurement Tool for Internet Service Provider
S Chormuan, W Uttha
A Multi-agent Approach for Semantic Annotation of Source Code Artefact
P Wongthongtham, U Pakdeetrakulwong, S Sae-Lim, W Uttha, ...
The system can't perform the operation now. Try again later.
Articles 1–13