The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ninghui Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cristina Nita-Rotaru, Ninghui Li
    A Framework for Role-Based Access Control in Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:522-529 [Conf]
  2. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:301-317 [Conf]
  3. Ninghui Li, John C. Mitchell, Derrick Tong
    Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:262-271 [Conf]
  4. Jiangtao Li, Ninghui Li, William H. Winsborough
    Automated trust negotiation using cryptographic credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:46-57 [Conf]
  5. Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara
    On mutually-exclusive roles and separation of duty. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:42-51 [Conf]
  6. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf]
  7. Ninghui Li, Qihua Wang
    Beyond separation of duty: an algebra for specifying high-level security policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:356-369 [Conf]
  8. Ninghui Li, Ziqing Mao
    Administration in role-based access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:127-138 [Conf]
  9. Mahesh V. Tripunitara, Ninghui Li
    Comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:62-71 [Conf]
  10. Qihua Wang, Ninghui Li
    Direct static enforcement of high-level security policies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:214-225 [Conf]
  11. Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
    Resiliency policies in access control. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf]
  12. Ninghui Li
    Local Names in SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:2-15 [Conf]
  13. Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof
    A Logic-based Knowledge Representation for Authorization with Delegation. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:162-174 [Conf]
  14. Ninghui Li, John C. Mitchell
    Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:89-0 [Conf]
  15. Ninghui Li, John C. Mitchell
    A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:201-0 [Conf]
  16. Ninghui Li, Joan Feigenbaum
    Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:157-168 [Conf]
  17. Elisa Bertino, Ji-Won Byun, Ninghui Li
    Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:178-206 [Conf]
  18. Tiancheng Li, Ninghui Li
    Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:518-523 [Conf]
  19. Jiangtao Li, Ninghui Li
    A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:122-138 [Conf]
  20. Ziqing Mao, Ninghui Li, William H. Winsborough
    Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:159-173 [Conf]
  21. Ninghui Li, John C. Mitchell
    DATALOG with Constraints: A Foundation for Trust Management Languages. [Citation Graph (0, 0)][DBLP]
    PADL, 2003, pp:58-73 [Conf]
  22. Jiangtao Li, Ninghui Li
    Policy-hiding access control in open environment. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:29-38 [Conf]
  23. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:182-189 [Conf]
  24. William H. Winsborough, Ninghui Li
    Towards Practical Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:92-103 [Conf]
  25. Ji-Won Byun, Elisa Bertino, Ninghui Li
    Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:102-110 [Conf]
  26. Hong Chen, Ninghui Li
    Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:130-138 [Conf]
  27. Ninghui Li, Mahesh V. Tripunitara
    Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:126-135 [Conf]
  28. Xiaoxin Wu, Ninghui Li
    Achieving privacy in mesh networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:13-22 [Conf]
  29. Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li
    Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:48-63 [Conf]
  30. Ninghui Li, William H. Winsborough, John C. Mitchell
    Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf]
  31. Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
    A Practically Implementable and Tractable Delegation Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:27-42 [Conf]
  32. Ninghui Li, John C. Mitchell, William H. Winsborough
    Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf]
  33. Ninghui Li, Mahesh V. Tripunitara
    On Safety in Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:96-109 [Conf]
  34. William H. Winsborough, Ninghui Li
    Safety in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:147-160 [Conf]
  35. Ninghui Li, Ziqing Mao, Hong Chen
    Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf]
  36. William H. Winsborough, Ninghui Li
    Protecting sensitive attributes in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:41-51 [Conf]
  37. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal]
  38. Ninghui Li, John C. Mitchell
    Understanding SPKI/SDSI using first-order logic. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:48-64 [Journal]
  39. Ninghui Li, John C. Mitchell, William H. Winsborough
    Beyond proof-of-compliance: security analysis in trust management. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2005, v:52, n:3, pp:474-514 [Journal]
  40. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed Credential Chain Discovery in Trust Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:1, pp:35-86 [Journal]
  41. Mahesh V. Tripunitara, Ninghui Li
    A theory for comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:2, pp:231-272 [Journal]
  42. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:340-352 [Journal]
  43. Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
    Delegation logic: A logic-based approach to distributed authorization. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:128-171 [Journal]
  44. Ninghui Li, Mahesh V. Tripunitara
    Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:391-420 [Journal]
  45. William H. Winsborough, Ninghui Li
    Safety in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:352-390 [Journal]
  46. Jiangtao Li, Ninghui Li, Rui Xue
    Universal Accumulators with Efficient Nonmembership Proofs. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:253-269 [Conf]
  47. Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li
    Efficient k -Anonymization Using Clustering Techniques. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2007, pp:188-200 [Conf]
  48. Qihua Wang, Ninghui Li
    Satisfiability and Resiliency in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:90-105 [Conf]
  49. Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian
    t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:106-115 [Conf]
  50. Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun
    On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:555-566 [Conf]
  51. Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu
    A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal]
  52. Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri
    On mutually exclusive roles and separation-of-duty. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
  53. Ji-Won Byun, Ninghui Li
    Purpose based access control for privacy protection in relational database systems. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  54. On the Security of Delegation in Access Control Systems. [Citation Graph (, )][DBLP]


  55. Access Control Friendly Query Verification for Outsourced Data Publishing. [Citation Graph (, )][DBLP]


  56. WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. [Citation Graph (, )][DBLP]


  57. Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. [Citation Graph (, )][DBLP]


  58. Dynamic Virtual Credit Card Numbers. [Citation Graph (, )][DBLP]


  59. Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. [Citation Graph (, )][DBLP]


  60. Injector: Mining Background Knowledge for Data Anonymization. [Citation Graph (, )][DBLP]


  61. Modeling and Integrating Background Knowledge in Data Anonymization. [Citation Graph (, )][DBLP]


  62. On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. [Citation Graph (, )][DBLP]


  63. How to make Discretionary Access Control secure against trojan horses. [Citation Graph (, )][DBLP]


  64. On the tradeoff between privacy and utility in data publishing. [Citation Graph (, )][DBLP]


  65. PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]


  66. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. [Citation Graph (, )][DBLP]


  67. EXAM: An Environment for Access Control Policy Analysis and Management. [Citation Graph (, )][DBLP]


  68. Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP]


  69. Mining roles with semantic meanings. [Citation Graph (, )][DBLP]


  70. An algebra for fine-grained integration of XACML policies. [Citation Graph (, )][DBLP]


  71. Evaluating role mining algorithms. [Citation Graph (, )][DBLP]


  72. An efficient framework for user authorization queries in RBAC systems. [Citation Graph (, )][DBLP]


  73. Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP]


  74. Access control policy combining: theory meets practice. [Citation Graph (, )][DBLP]


  75. Mining roles with noisy data. [Citation Graph (, )][DBLP]


  76. Towards analyzing complex operating system access control configurations. [Citation Graph (, )][DBLP]


  77. A formal semantics for P3P. [Citation Graph (, )][DBLP]


  78. Slicing: A New Approach to Privacy Preserving Data Publishing [Citation Graph (, )][DBLP]


  79. Towards optimal k-anonymization. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.422secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002