Search the dblp DataBase
Ninghui Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cristina Nita-Rotaru , Ninghui Li A Framework for Role-Based Access Control in Group Communication Systems. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:522-529 [Conf ] Jiangtao Li , Ninghui Li OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:301-317 [Conf ] Ninghui Li , John C. Mitchell , Derrick Tong Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:262-271 [Conf ] Jiangtao Li , Ninghui Li , William H. Winsborough Automated trust negotiation using cryptographic credentials. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:46-57 [Conf ] Ninghui Li , Ziad Bizri , Mahesh V. Tripunitara On mutually-exclusive roles and separation of duty. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:42-51 [Conf ] Ninghui Li , William H. Winsborough , John C. Mitchell Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf ] Ninghui Li , Qihua Wang Beyond separation of duty: an algebra for specifying high-level security policies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:356-369 [Conf ] Ninghui Li , Ziqing Mao Administration in role-based access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:127-138 [Conf ] Mahesh V. Tripunitara , Ninghui Li Comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:62-71 [Conf ] Qihua Wang , Ninghui Li Direct static enforcement of high-level security policies. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:214-225 [Conf ] Ninghui Li , Mahesh V. Tripunitara , Qihua Wang Resiliency policies in access control. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf ] Ninghui Li Local Names in SPKI/SDSI. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:2-15 [Conf ] Ninghui Li , Joan Feigenbaum , Benjamin N. Grosof A Logic-based Knowledge Representation for Authorization with Delegation. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:162-174 [Conf ] Ninghui Li , John C. Mitchell Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:89-0 [Conf ] Ninghui Li , John C. Mitchell A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:201-0 [Conf ] Ninghui Li , Joan Feigenbaum Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:157-168 [Conf ] Elisa Bertino , Ji-Won Byun , Ninghui Li Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP ] FOSAD, 2005, pp:178-206 [Conf ] Tiancheng Li , Ninghui Li Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:518-523 [Conf ] Jiangtao Li , Ninghui Li A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:122-138 [Conf ] Ziqing Mao , Ninghui Li , William H. Winsborough Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:159-173 [Conf ] Ninghui Li , John C. Mitchell DATALOG with Constraints: A Foundation for Trust Management Languages. [Citation Graph (0, 0)][DBLP ] PADL, 2003, pp:58-73 [Conf ] Jiangtao Li , Ninghui Li Policy-hiding access control in open environment. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:29-38 [Conf ] Ninghui Li , Wenliang Du , Dan Boneh Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:182-189 [Conf ] William H. Winsborough , Ninghui Li Towards Practical Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:92-103 [Conf ] Ji-Won Byun , Elisa Bertino , Ninghui Li Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:102-110 [Conf ] Hong Chen , Ninghui Li Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:130-138 [Conf ] Ninghui Li , Mahesh V. Tripunitara Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:126-135 [Conf ] Xiaoxin Wu , Ninghui Li Achieving privacy in mesh networks. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:13-22 [Conf ] Ji-Won Byun , Yonglak Sohn , Elisa Bertino , Ninghui Li Secure Anonymization for Incremental Datasets. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:48-63 [Conf ] Ninghui Li , William H. Winsborough , John C. Mitchell Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf ] Ninghui Li , Benjamin N. Grosof , Joan Feigenbaum A Practically Implementable and Tractable Delegation Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:27-42 [Conf ] Ninghui Li , John C. Mitchell , William H. Winsborough Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf ] Ninghui Li , Mahesh V. Tripunitara On Safety in Discretionary Access Control. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:96-109 [Conf ] William H. Winsborough , Ninghui Li Safety in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:147-160 [Conf ] Ninghui Li , Ziqing Mao , Hong Chen Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf ] William H. Winsborough , Ninghui Li Protecting sensitive attributes in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:41-51 [Conf ] Ninghui Li , Wenliang Du , Dan Boneh Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal ] Ninghui Li , John C. Mitchell Understanding SPKI/SDSI using first-order logic. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:1, pp:48-64 [Journal ] Ninghui Li , John C. Mitchell , William H. Winsborough Beyond proof-of-compliance: security analysis in trust management. [Citation Graph (0, 0)][DBLP ] J. ACM, 2005, v:52, n:3, pp:474-514 [Journal ] Ninghui Li , William H. Winsborough , John C. Mitchell Distributed Credential Chain Discovery in Trust Management. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:1, pp:35-86 [Journal ] Mahesh V. Tripunitara , Ninghui Li A theory for comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:2, pp:231-272 [Journal ] Jiangtao Li , Ninghui Li OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:340-352 [Journal ] Ninghui Li , Benjamin N. Grosof , Joan Feigenbaum Delegation logic: A logic-based approach to distributed authorization. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:128-171 [Journal ] Ninghui Li , Mahesh V. Tripunitara Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:391-420 [Journal ] William H. Winsborough , Ninghui Li Safety in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:352-390 [Journal ] Jiangtao Li , Ninghui Li , Rui Xue Universal Accumulators with Efficient Nonmembership Proofs. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:253-269 [Conf ] Ji-Won Byun , Ashish Kamra , Elisa Bertino , Ninghui Li Efficient k -Anonymization Using Clustering Techniques. [Citation Graph (0, 0)][DBLP ] DASFAA, 2007, pp:188-200 [Conf ] Qihua Wang , Ninghui Li Satisfiability and Resiliency in Workflow Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:90-105 [Conf ] Ninghui Li , Tiancheng Li , Suresh Venkatasubramanian t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. [Citation Graph (0, 0)][DBLP ] ICDE, 2007, pp:106-115 [Conf ] Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , Ji-Won Byun On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:555-566 [Conf ] Annie I. Antón , Elisa Bertino , Ninghui Li , Ting Yu A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal ] Ninghui Li , Mahesh V. Tripunitara , Ziad Bizri On mutually exclusive roles and separation-of-duty. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal ] Ji-Won Byun , Ninghui Li Purpose based access control for privacy protection in relational database systems. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] On the Security of Delegation in Access Control Systems. [Citation Graph (, )][DBLP ] Access Control Friendly Query Verification for Outsourced Data Publishing. [Citation Graph (, )][DBLP ] WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. [Citation Graph (, )][DBLP ] Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. [Citation Graph (, )][DBLP ] Dynamic Virtual Credit Card Numbers. [Citation Graph (, )][DBLP ] Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. [Citation Graph (, )][DBLP ] Injector: Mining Background Knowledge for Data Anonymization. [Citation Graph (, )][DBLP ] Modeling and Integrating Background Knowledge in Data Anonymization. [Citation Graph (, )][DBLP ] On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. [Citation Graph (, )][DBLP ] How to make Discretionary Access Control secure against trojan horses. [Citation Graph (, )][DBLP ] On the tradeoff between privacy and utility in data publishing. [Citation Graph (, )][DBLP ] PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP ] Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. [Citation Graph (, )][DBLP ] EXAM: An Environment for Access Control Policy Analysis and Management. [Citation Graph (, )][DBLP ] Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP ] Mining roles with semantic meanings. [Citation Graph (, )][DBLP ] An algebra for fine-grained integration of XACML policies. [Citation Graph (, )][DBLP ] Evaluating role mining algorithms. [Citation Graph (, )][DBLP ] An efficient framework for user authorization queries in RBAC systems. [Citation Graph (, )][DBLP ] Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP ] Access control policy combining: theory meets practice. [Citation Graph (, )][DBLP ] Mining roles with noisy data. [Citation Graph (, )][DBLP ] Towards analyzing complex operating system access control configurations. [Citation Graph (, )][DBLP ] A formal semantics for P3P. [Citation Graph (, )][DBLP ] Slicing: A New Approach to Privacy Preserving Data Publishing [Citation Graph (, )][DBLP ] Towards optimal k-anonymization. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.422secs