Search the dblp DataBase
Qihua Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ninghui Li , Qihua Wang Beyond separation of duty: an algebra for specifying high-level security policies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:356-369 [Conf ] Qihua Wang , Ninghui Li Direct static enforcement of high-level security policies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:214-225 [Conf ] Ninghui Li , Mahesh V. Tripunitara , Qihua Wang Resiliency policies in access control. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf ] Qihua Wang , Ninghui Li Satisfiability and Resiliency in Workflow Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:90-105 [Conf ] Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , Ji-Won Byun On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:555-566 [Conf ] Selective message distribution with people-tagging in user-collaborative environments. [Citation Graph (, )][DBLP ] On the Security of Delegation in Access Control Systems. [Citation Graph (, )][DBLP ] Access Control Friendly Query Verification for Outsourced Data Publishing. [Citation Graph (, )][DBLP ] Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. [Citation Graph (, )][DBLP ] Mining roles with semantic meanings. [Citation Graph (, )][DBLP ] Evaluating role mining algorithms. [Citation Graph (, )][DBLP ] Access control policy combining: theory meets practice. [Citation Graph (, )][DBLP ] Automatic Categorization of Tags in Collaborative Environments. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs