The SCEAS System
Navigation Menu

Search the dblp DataBase


Erica Y. Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Erica Y. Yang, Jie Xu, Keith H. Bennett
    Private Information Retrieval in the Presence of Malicious Failures. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:805-812 [Conf]
  2. Jie Xu, Erica Y. Yang, Keith H. Bennett
    A Practical Approach to Secure Web Services. [Citation Graph (0, 0)][DBLP]
    ISORC, 2006, pp:512-519 [Conf]
  3. Erica Y. Yang, Jie Xu, Keith H. Bennett
    A Fault-Tolerant Approach to Secure Information Retrieval. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:12-21 [Conf]

  4. Modelling Security Properties in a Grid-based Operating System with Anti-Goals. [Citation Graph (, )][DBLP]

  5. Detecting Conflicts in ABAC Policies with Rule-Reduction and Binary-Search Techniques. [Citation Graph (, )][DBLP]

  6. Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System. [Citation Graph (, )][DBLP]

  7. Virtual Organization Management in XtreemOS: an Overview. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.001secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002