The SCEAS System
Navigation Menu

Search the dblp DataBase


Xinwen Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
    Secure information sharing enabled by Trusted Computing and PEI models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:2-12 [Conf]
  2. Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce
    Safety analysis of usage control authorization models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:243-254 [Conf]
  3. Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu
    A general design towards secure ad-hoc collaboration. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:358- [Conf]
  4. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
    SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:117-126 [Conf]
  5. Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
    Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:15-29 [Conf]
  6. Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
    Schema Based XML Security: RBAC Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:330-343 [Conf]
  7. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu
    Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:179-195 [Conf]
  8. Yingjiu Li, Xinwen Zhang
    A Security-Enhanced One-Time Payment Scheme for Credit Card. [Citation Graph (0, 0)][DBLP]
    RIDE, 2004, pp:40-47 [Conf]
  9. Xinwen Zhang, Yingjiu Li, Divya Nalla
    An attribute-based access matrix model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:359-363 [Conf]
  10. Ravi S. Sandhu, Xinwen Zhang
    Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:147-158 [Conf]
  11. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
    A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:180-189 [Conf]
  12. Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
    PBDM: a flexible delegation model in RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:149-157 [Conf]
  13. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
    A logical specification for usage control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:1-10 [Conf]
  14. Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
    WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. [Citation Graph (0, 0)][DBLP]
    ANCS, 2006, pp:173-182 [Conf]
  15. Yingjiu Li, Xinwen Zhang
    Securing credit card transactions with one-time payment scheme. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2005, v:4, n:4, pp:413-426 [Journal]
  16. Xinwen Zhang, Songqing Chen, Ravi S. Sandhu
    Enhancing Data Authenticity and Integrity in P2P Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2005, v:9, n:6, pp:42-49 [Journal]
  17. Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington
    Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal]
  18. Sejong Oh, Ravi S. Sandhu, Xinwen Zhang
    An effective role administration model using organization structure. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:113-137 [Journal]
  19. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park
    Formal model and policy specification of usage control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:351-387 [Journal]
  20. Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
    Towards a Times-Based Usage Control Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:227-242 [Conf]
  21. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
    Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:71-80 [Conf]

  22. Usage control platformization via trustworthy SELinux. [Citation Graph (, )][DBLP]

  23. A trusted mobile phone reference architecturevia secure kernel. [Citation Graph (, )][DBLP]

  24. Apex: extending Android permission model and enforcement with user-defined runtime constraints. [Citation Graph (, )][DBLP]

  25. Towards System Integrity Protection with Graph-Based Policy Analysis. [Citation Graph (, )][DBLP]

  26. A Model-Driven Framework for Trusted Computing Based Systems. [Citation Graph (, )][DBLP]

  27. DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. [Citation Graph (, )][DBLP]

  28. Flexible Authorization with Decentralized Access Control Model for Grid Computing. [Citation Graph (, )][DBLP]

  29. Towards a Group-Based RBAC Model and Decentralized User-Role Administration. [Citation Graph (, )][DBLP]

  30. Behavioral Attestation for Business Processes. [Citation Graph (, )][DBLP]

  31. Access control in Group Communication Systems. [Citation Graph (, )][DBLP]

  32. Towards a Usage Control Policy Specification with Petri Nets. [Citation Graph (, )][DBLP]

  33. Systematic Policy Analysis for High-Assurance Services in SELinux. [Citation Graph (, )][DBLP]

  34. Towards Session-Aware RBAC Administration and Enforcement with XACML. [Citation Graph (, )][DBLP]

  35. VirusMeter: Preventing Your Cellphone from Spies. [Citation Graph (, )][DBLP]

  36. A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]

  37. Model-based behavioral attestation. [Citation Graph (, )][DBLP]

  38. Patient-centric authorization framework for sharing electronic health records. [Citation Graph (, )][DBLP]

  39. Security Enforcement Model for Distributed Usage Control. [Citation Graph (, )][DBLP]

  40. Access Control Model for Sharing Composite Electronic Health Records. [Citation Graph (, )][DBLP]

  41. Building a stateful reference monitor with coloured petri nets. [Citation Graph (, )][DBLP]

  42. A usage control policy specification with Petri nets. [Citation Graph (, )][DBLP]

  43. pBMDS: a behavior-based malware detection system for cellphone devices. [Citation Graph (, )][DBLP]

  44. A technical architecture for enforcing usage control requirements in service-oriented architectures. [Citation Graph (, )][DBLP]

  45. Behavioral attestation for web services (BA4WS). [Citation Graph (, )][DBLP]

  46. Remote Attestation of Attribute Updates and Information Flows in a UCON System. [Citation Graph (, )][DBLP]

  47. Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. [Citation Graph (, )][DBLP]

  48. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. [Citation Graph (, )][DBLP]

  49. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. [Citation Graph (, )][DBLP]

  50. Towards secure dynamic collaborations with group-based RBAC model. [Citation Graph (, )][DBLP]

Search in 0.496secs, Finished in 0.500secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002