|
Search the dblp DataBase
Xinwen Zhang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:2-12 [Conf]
- Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce
Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:243-254 [Conf]
- Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu
A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:358- [Conf]
- Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:117-126 [Conf]
- Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:15-29 [Conf]
- Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
Schema Based XML Security: RBAC Approach. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:330-343 [Conf]
- Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP] IWSEC, 2006, pp:179-195 [Conf]
- Yingjiu Li, Xinwen Zhang
A Security-Enhanced One-Time Payment Scheme for Credit Card. [Citation Graph (0, 0)][DBLP] RIDE, 2004, pp:40-47 [Conf]
- Xinwen Zhang, Yingjiu Li, Divya Nalla
An attribute-based access matrix model. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:359-363 [Conf]
- Ravi S. Sandhu, Xinwen Zhang
Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:147-158 [Conf]
- Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2006, pp:180-189 [Conf]
- Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
PBDM: a flexible delegation model in RBAC. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:149-157 [Conf]
- Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
A logical specification for usage control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:1-10 [Conf]
- Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. [Citation Graph (0, 0)][DBLP] ANCS, 2006, pp:173-182 [Conf]
- Yingjiu Li, Xinwen Zhang
Securing credit card transactions with one-time payment scheme. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2005, v:4, n:4, pp:413-426 [Journal]
- Xinwen Zhang, Songqing Chen, Ravi S. Sandhu
Enhancing Data Authenticity and Integrity in P2P Systems. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2005, v:9, n:6, pp:42-49 [Journal]
- Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington
Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal]
- Sejong Oh, Ravi S. Sandhu, Xinwen Zhang
An effective role administration model using organization structure. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:113-137 [Journal]
- Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park
Formal model and policy specification of usage control. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:351-387 [Journal]
- Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
Towards a Times-Based Usage Control Model. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:227-242 [Conf]
- Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:71-80 [Conf]
Usage control platformization via trustworthy SELinux. [Citation Graph (, )][DBLP]
A trusted mobile phone reference architecturevia secure kernel. [Citation Graph (, )][DBLP]
Apex: extending Android permission model and enforcement with user-defined runtime constraints. [Citation Graph (, )][DBLP]
Towards System Integrity Protection with Graph-Based Policy Analysis. [Citation Graph (, )][DBLP]
A Model-Driven Framework for Trusted Computing Based Systems. [Citation Graph (, )][DBLP]
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. [Citation Graph (, )][DBLP]
Flexible Authorization with Decentralized Access Control Model for Grid Computing. [Citation Graph (, )][DBLP]
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. [Citation Graph (, )][DBLP]
Behavioral Attestation for Business Processes. [Citation Graph (, )][DBLP]
Access control in Group Communication Systems. [Citation Graph (, )][DBLP]
Towards a Usage Control Policy Specification with Petri Nets. [Citation Graph (, )][DBLP]
Systematic Policy Analysis for High-Assurance Services in SELinux. [Citation Graph (, )][DBLP]
Towards Session-Aware RBAC Administration and Enforcement with XACML. [Citation Graph (, )][DBLP]
VirusMeter: Preventing Your Cellphone from Spies. [Citation Graph (, )][DBLP]
A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]
Model-based behavioral attestation. [Citation Graph (, )][DBLP]
Patient-centric authorization framework for sharing electronic health records. [Citation Graph (, )][DBLP]
Security Enforcement Model for Distributed Usage Control. [Citation Graph (, )][DBLP]
Access Control Model for Sharing Composite Electronic Health Records. [Citation Graph (, )][DBLP]
Building a stateful reference monitor with coloured petri nets. [Citation Graph (, )][DBLP]
A usage control policy specification with Petri nets. [Citation Graph (, )][DBLP]
pBMDS: a behavior-based malware detection system for cellphone devices. [Citation Graph (, )][DBLP]
A technical architecture for enforcing usage control requirements in service-oriented architectures. [Citation Graph (, )][DBLP]
Behavioral attestation for web services (BA4WS). [Citation Graph (, )][DBLP]
Remote Attestation of Attribute Updates and Information Flows in a UCON System. [Citation Graph (, )][DBLP]
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. [Citation Graph (, )][DBLP]
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. [Citation Graph (, )][DBLP]
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. [Citation Graph (, )][DBLP]
Towards secure dynamic collaborations with group-based RBAC model. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|