BibTeX records: Vincent C. Hu

download as .bib file

@article{DBLP:journals/corr/abs-2303-16688,
  author       = {Antonios Gouglidis and
                  Anna Kagia and
                  Vincent C. Hu},
  title        = {Model Checking Access Control Policies: {A} Case Study using Google
                  Cloud {IAM}},
  journal      = {CoRR},
  volume       = {abs/2303.16688},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.16688},
  doi          = {10.48550/ARXIV.2303.16688},
  eprinttype    = {arXiv},
  eprint       = {2303.16688},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-16688.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/Hu20,
  author       = {Vincent C. Hu},
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Apply Quantum Search to the Safety Check for Mono Operational Attribute
                  Based Protection Systems},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 13th International Conference, SpaCCS 2020, Nanjing, China,
                  December 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12382},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68851-6\_12},
  doi          = {10.1007/978-3-030-68851-6\_12},
  timestamp    = {Fri, 05 Feb 2021 12:16:10 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/Hu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuKF18,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  David F. Ferraiolo},
  title        = {Access Control for Emerging Distributed Systems},
  journal      = {Computer},
  volume       = {51},
  number       = {10},
  pages        = {100--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3971347},
  doi          = {10.1109/MC.2018.3971347},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuKF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/KuhnYKLH18,
  author       = {Rick Kuhn and
                  Dylan Yaga and
                  Raghu Kacker and
                  Jeff Yu Lei and
                  Vincent C. Hu},
  editor       = {{\'{O}}scar Mort{\'{a}}gua Pereira},
  title        = {Pseudo-Exhaustive Verification of Rule Based Systems},
  booktitle    = {The 30th International Conference on Software Engineering and Knowledge
                  Engineering, Hotel Pullman, Redwood City, California, USA, July 1-3,
                  2018},
  pages        = {586--585},
  publisher    = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School},
  year         = {2018},
  url          = {https://doi.org/10.18293/SEKE2018-072},
  doi          = {10.18293/SEKE2018-072},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/KuhnYKLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GouglidisHBH17,
  author       = {Antonios Gouglidis and
                  Vincent C. Hu and
                  Jeremy Busby and
                  David Hutchison},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Verification of Resilience Policies that Assist Attribute Based Access
                  Control},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control,
                  ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041048.3041049},
  doi          = {10.1145/3041048.3041049},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GouglidisHBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/LiLH17,
  author       = {Ang Li and
                  Qinghua Li and
                  Vincent C. Hu},
  title        = {Access Control for Distributed Processing Systems: Use Cases and General
                  Considerations},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {117--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00026},
  doi          = {10.1109/CIC.2017.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/LiLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuK16,
  author       = {Vincent C. Hu and
                  Rick Kuhn},
  title        = {Access Control Policy Verification},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {80--83},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.368},
  doi          = {10.1109/MC.2016.368},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FerraioloCKH16,
  author       = {David F. Ferraiolo and
                  Ramaswamy Chandramouli and
                  Rick Kuhn and
                  Vincent C. Hu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Extensible Access Control Markup Language {(XACML)} and Next Generation
                  Access Control {(NGAC)}},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875496},
  doi          = {10.1145/2875491.2875496},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/FerraioloCKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AlumbaughLH16,
  author       = {John Calvin Alumbaugh and
                  Qinghua Li and
                  Vincent C. Hu},
  title        = {Differentiating Non-Isomorphic Graphlets for Graph Analytics},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {349--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.053},
  doi          = {10.1109/CIC.2016.053},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AlumbaughLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/KuhnHFKL16,
  author       = {D. Richard Kuhn and
                  Vincent C. Hu and
                  David F. Ferraiolo and
                  Raghu N. Kacker and
                  Yu Lei},
  title        = {Pseudo-Exhaustive Testing of Attribute Based Access Control Rules},
  booktitle    = {Ninth {IEEE} International Conference on Software Testing, Verification
                  and Validation Workshops, {ICST} Workshops 2016, Chicago, IL, USA,
                  April 11-15, 2016},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICSTW.2016.35},
  doi          = {10.1109/ICSTW.2016.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/KuhnHFKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HuK16,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn},
  title        = {General Methods for Access Control Policy Verification (Application
                  Paper)},
  booktitle    = {17th {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016},
  pages        = {315--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IRI.2016.49},
  doi          = {10.1109/IRI.2016.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/HuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuKF15,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  David F. Ferraiolo},
  title        = {Attribute-Based Access Control},
  journal      = {Computer},
  volume       = {48},
  number       = {2},
  pages        = {85--88},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.33},
  doi          = {10.1109/MC.2015.33},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HuFKKL15,
  author       = {Vincent C. Hu and
                  David F. Ferraiolo and
                  D. Richard Kuhn and
                  Raghu N. Kacker and
                  Yu Lei},
  title        = {Implementing and Managing Policy Rules in Attribute Based Access Control},
  booktitle    = {2015 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015},
  pages        = {518--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IRI.2015.98},
  doi          = {10.1109/IRI.2015.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/HuFKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LiLHD15,
  author       = {Ang Li and
                  Qinghua Li and
                  Vincent C. Hu and
                  Jia Di},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Evaluating the capability and performance of access control policy
                  verification tools},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {366--371},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357470},
  doi          = {10.1109/MILCOM.2015.7357470},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/LiLHD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GouglidisMH14,
  author       = {Antonios Gouglidis and
                  Ioannis Mavridis and
                  Vincent C. Hu},
  title        = {Security policy verification for multi-domains in cloud systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {2},
  pages        = {97--111},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0205-x},
  doi          = {10.1007/S10207-013-0205-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GouglidisMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/HuGFK14,
  author       = {Vincent C. Hu and
                  Tim Grance and
                  David F. Ferraiolo and
                  D. Richard Kuhn},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {An Access Control scheme for Big Data processing},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {1--7},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257649},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257649},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/HuGFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/HuS13,
  author       = {Vincent C. Hu and
                  Karen Scarfone},
  title        = {Real-Time Access Control Rule Fault Detection Using a Simulated Logic
                  Circuit},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {494--501},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.76},
  doi          = {10.1109/SOCIALCOM.2013.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/HuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GouglidisMH13,
  author       = {Antonios Gouglidis and
                  Ioannis Mavridis and
                  Vincent C. Hu},
  title        = {Verification of Secure Inter-operation Properties in Multi-domain
                  {RBAC} Systems},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {35--44},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.25},
  doi          = {10.1109/SERE-C.2013.25},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GouglidisMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HwangHX12,
  author       = {JeeHyun Hwang and
                  Vincent C. Hu and
                  Tao Xie},
  title        = {Paradigm in Verification of Access Control},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {193},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.14},
  doi          = {10.1109/SERE-C.2012.14},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HwangHX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/HuKXH11,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  Tao Xie and
                  JeeHyun Hwang},
  title        = {Model Checking for Verification of Mandatory Access Control Models
                  and Properties},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {21},
  number       = {1},
  pages        = {103--127},
  year         = {2011},
  url          = {https://doi.org/10.1142/S021819401100513X},
  doi          = {10.1142/S021819401100513X},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/HuKXH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HuFG10,
  author       = {Vincent C. Hu and
                  David F. Ferraiolo and
                  Serban I. Gavrila},
  title        = {Specification of attribute relations for access control policies and
                  constraints using Policy Machine},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {32--35},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604043},
  doi          = {10.1109/ISIAS.2010.5604043},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HuFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HwangXHA10,
  author       = {JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu and
                  Mine Altunay},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Mining Likely Properties of Access Control Policies via Association
                  Rule Mining},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_13},
  doi          = {10.1007/978-3-642-13739-6\_13},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/HwangXHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/HwangXHA10,
  author       = {JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu and
                  Mine Altunay},
  title        = {{ACPT:} {A} Tool for Modeling and Verifying Access Control Policies},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {40--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.22},
  doi          = {10.1109/POLICY.2010.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/HwangXHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/se/HwangMXH10,
  author       = {JeeHyun Hwang and
                  Evan Martin and
                  Tao Xie and
                  Vincent C. Hu},
  editor       = {Phillip A. Laplante},
  title        = {Policy-Based Testing},
  booktitle    = {Encyclopedia of Software Engineering},
  pages        = {673--683},
  publisher    = {Taylor {\&} Francis},
  year         = {2010},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044237},
  doi          = {10.1081/E-ESE-120044237},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/se/HwangMXH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HwangXH09,
  author       = {JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu},
  title        = {Detection of Multiple-Duty-Related Security Leakage in Access Control
                  Policies},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.63},
  doi          = {10.1109/SSIRI.2009.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HwangXH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartinHXH08,
  author       = {Evan Martin and
                  JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu},
  title        = {Assessing Quality of Policy Properties in Verification of Access Control
                  Policies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {163--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.48},
  doi          = {10.1109/ACSAC.2008.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartinHXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HuKX08,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  Tao Xie},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Property Verification for Generic Access Control Models},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {243--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.22},
  doi          = {10.1109/EUC.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/HuKX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/HuFS07,
  author       = {Vincent C. Hu and
                  David F. Ferraiolo and
                  Karen Scarfone},
  title        = {Access Control Policy Combinations for the Grid Using the Policy Machine},
  booktitle    = {Seventh {IEEE} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2007), 14-17 May 2007, Rio de Janeiro, Brazil},
  pages        = {225--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CCGRID.2007.15},
  doi          = {10.1109/CCGRID.2007.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/HuFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HuMHX07,
  author       = {Vincent C. Hu and
                  Evan Martin and
                  JeeHyun Hwang and
                  Tao Xie},
  title        = {Conformance Checking of Access Control Policies Specified in {XACML}},
  booktitle    = {31st Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 2},
  pages        = {275--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMPSAC.2007.96},
  doi          = {10.1109/COMPSAC.2007.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HuMHX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/HuSGF07,
  author       = {Vincent C. Hu and
                  Karen Scarfone and
                  Serban I. Gavrila and
                  David F. Ferraiolo},
  editor       = {Jianzhong Li and
                  Wang{-}Chien Lee and
                  Fabrizio Silvestri},
  title        = {A trust domain management schema for multiple grid environments},
  booktitle    = {Proceedings of the 2nf International Conference on Scalable Information
                  Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {304},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/infoscale.2007.223},
  doi          = {10.4108/INFOSCALE.2007.223},
  timestamp    = {Wed, 28 Nov 2018 12:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/infoscale/HuSGF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/HuKF06,
  author       = {Vincent C. Hu and
                  D. Richard Kuhn and
                  David F. Ferraiolo},
  title        = {The Computational Complexity of Enforceability Validation for Generic
                  Access Control Rules},
  booktitle    = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
                  Trustworthy Computing {(SUTC} 2006), 5-7 June 2006, Taichung, Taiwan},
  pages        = {260--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.131},
  doi          = {10.1109/SUTC.2006.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sutc/HuKF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FerraioloGHK05,
  author       = {David F. Ferraiolo and
                  Serban I. Gavrila and
                  Vincent C. Hu and
                  D. Richard Kuhn},
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {Composing and combining policies under the policy machine},
  booktitle    = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979.1063982},
  doi          = {10.1145/1063979.1063982},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/FerraioloGHK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/HuFF01,
  author       = {Vincent C. Hu and
                  Deborah A. Frincke and
                  David F. Ferraiolo},
  editor       = {Vassil N. Alexandrov and
                  Jack J. Dongarra and
                  Benjoe A. Juliano and
                  Ren{\'{e}} S. Renner and
                  Chih Jeng Kenneth Tan},
  title        = {The Policy Machine for Security Policy Management},
  booktitle    = {Computational Science - {ICCS} 2001, International Conference, San
                  Francisco, CA, USA, May 28-30, 2001. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2074},
  pages        = {494--506},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45718-6\_54},
  doi          = {10.1007/3-540-45718-6\_54},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/HuFF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaliassoBHSFH00,
  author       = {Pablo Galiasso and
                  Oliver Bremer and
                  John Hale and
                  Sujeet Shenoi and
                  David F. Ferraiolo and
                  Vincent C. Hu},
  title        = {Policy Mediation for Multi-Enterprise Environments},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {100--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898863},
  doi          = {10.1109/ACSAC.2000.898863},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaliassoBHSFH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics