


Остановите войну!
for scientists:
Xinwen Zhang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i4]Jin Fang, Jiacheng Weng, Yi Xiang, Xinwen Zhang:
Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window Denoise PPO. CoRR abs/2206.10736 (2022)
2010 – 2019
- 2019
- [c97]Yong Luo, Huaizheng Zhang, Yonggang Wen, Xinwen Zhang:
ResumeGAN: An Optimized Deep Representation Learning Framework for Talent-Job Fit via Adversarial Learning. CIKM 2019: 1101-1110 - [c96]Xinwen Zhang, Chao Jia, Weiguo Liu:
Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with Markovian Switching. ICMLC 2019: 114-118 - 2018
- [j29]Han Hu
, Yong Luo, Yonggang Wen, Yew-Soon Ong
, Xinwen Zhang:
How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach. IEEE Access 6: 60380-60395 (2018) - [j28]Weiwen Zhang, Yonggang Wen, Xinwen Zhang:
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection. IEEE Trans. Emerg. Top. Comput. 6(1): 122-134 (2018) - [c95]Yong Luo, Huaizheng Zhang, Yongjie Wang, Yonggang Wen, Xinwen Zhang:
ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment. ICDM 2018: 307-316 - [i3]Yong Luo, Huaizheng Zhang, Yongjie Wang, Yonggang Wen, Xinwen Zhang:
ResumeNet: A Learning-based Framework for Automatic Resume Quality Assessment. CoRR abs/1810.02832 (2018) - 2017
- [j27]Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Trans. Dependable Secur. Comput. 14(5): 494-506 (2017) - 2016
- [j26]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [c94]Huakang Li, Xinwen Zhang, Yitao Yang, Guozi Sun:
A Demonstration of Encrypted Logistics Information System. APWeb (2) 2016: 525-528 - [c93]Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. Trustcom/BigDataSE/ISPA 2016: 996-1000 - 2015
- [j25]Lu An, Xia Lin, Chuanming Yu, Xinwen Zhang:
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes. Scientometrics 105(3): 1605-1634 (2015) - [j24]Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(3): 298-311 (2015) - [j23]Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6): 675-687 (2015) - [j22]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu
:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [c92]Lei Xu
, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. CODASPY 2015: 167-169 - [c91]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen
, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c90]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2014
- [j21]Songqing Chen, Lei Liu, Xinyuan Wang, Xinwen Zhang, Zhao Zhang:
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment. ACM Trans. Auton. Adapt. Syst. 8(4): 21:1-21:18 (2014) - [j20]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms. IEEE Trans. Mob. Comput. 13(1): 188-201 (2014) - [c89]Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang:
Improved anonymous proxy re-encryption with CCA security. AsiaCCS 2014: 249-258 - [c88]Su Zhang, Xinwen Zhang, Xinming Ou:
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. AsiaCCS 2014: 317-328 - 2013
- [j19]Xingze He, Xinwen Zhang, C.-C. Jay Kuo
:
A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids. IEEE Access 1: 67-78 (2013) - [j18]Hai Jin, Ge Cheng, Deqing Zou, Xinwen Zhang:
Cherub: Fine-grained application protection with on-demand virtualization. Comput. Math. Appl. 65(9): 1326-1338 (2013) - [j17]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar
, Quratulain Alam:
Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302 (2013) - [c87]Wu Zhou, Xinwen Zhang, Xuxian Jiang:
AppInk: watermarking android apps for repackaging deterrence. AsiaCCS 2013: 1-12 - [c86]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. AsiaCCS 2013: 173-178 - [c85]Ravishankar Ravindran, Xuan Liu, Asit Chakraborti, Xinwen Zhang, Guoqiang Wang:
Towards software defined ICN based edge-cloud services. CloudNet 2013: 227-235 - [c84]Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao
:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. CNS 2013: 172-180 - [c83]Ravishankar Ravindran, Trisha Biswas, Xinwen Zhang, Asit Chakraborti, Guoqiang Wang:
Information-centric networking based homenet. IM 2013: 1102-1108 - [c82]Shangping Wang
, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [c81]Trisha Biswas, Asit Chakraborti, Ravishankar Ravindran, Xinwen Zhang, Guoqiang Wang:
Contextualized information-centric home network. SIGCOMM 2013: 461-462 - [c80]Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn
, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. SocialCom 2013: 423-428 - 2012
- [j16]Xinwen Zhang, Zhaoxin Wu, Bo Jiao, Dongdong Wang, Dawei Wang, Xun Hou:
White organic light-emitting devices with a solution-processed small molecular emission layer. Displays 33(3): 129-132 (2012) - [j15]Hammad Banuri, Masoom Alam, Shahryar Khan, Jawad Manzoor
, Bahar Ali, Yasar Khan, Mohsin Yaseen, Mir Nauman Tahir, Tamleek Ali, Quratulain Alam, Xinwen Zhang:
An Android runtime security policy enforcement framework. Pers. Ubiquitous Comput. 16(6): 631-641 (2012) - [j14]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn
, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [j13]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. IEEE Trans. Inf. Forensics Secur. 7(2): 691-703 (2012) - [c79]Ravishankar Ravindran, Guoqiang Wang, Xinwen Zhang, Asit Chakraborti:
Supporting dual-mode forwarding in content-centric network. IEEE ANTS 2012: 55-60 - [c78]Lei Xu
, Xiaoxin Wu, Xinwen Zhang:
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. AsiaCCS 2012: 87-88 - [c77]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. CCS 2012: 1001-1003 - [c76]Xinwen Zhang, Xuhua Ding:
STC 2012: the seventh ACM workshop on scalable trusted computing. CCS 2012: 1058-1059 - [c75]Weidong Shi, Jong-Hyuk Lee, Taeweon Suh, Dong Hyuk Woo, Xinwen Zhang:
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security. Conf. Computing Frontiers 2012: 75-84 - [c74]Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen:
Towards end-to-end secure content storage and delivery with public cloud. CODASPY 2012: 257-266 - [c73]Ravishankar Ravindran, Samantha Lo, Xinwen Zhang, Guoqiang Wang:
Supporting seamless mobility in named data networking. ICC 2012: 5854-5869 - [c72]Sokol Kosta
, Andrius Aucinas, Pan Hui, Richard Mortier
, Xinwen Zhang:
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. INFOCOM 2012: 945-953 - [c71]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Chrome Extensions: Threat Analysis and Countermeasures. NDSS 2012 - [c70]Jiafeng Zhu, Jingji Zheng, Xinwen Zhang, Zhengyi Le, Min Luo
:
On-demand security service. PETRA 2012: 7 - [c69]Yang Qin, Dijiang Huang
, Xinwen Zhang:
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. TrustCom 2012: 1438-1445 - [e2]Stefan Katzenbeisser, Edgar R. Weippl
, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - [i2]Qingji Zheng, Xinwen Zhang:
Multiparty Cloud Computation. CoRR abs/1206.3717 (2012) - 2011
- [j12]Jing Jin, Gail-Joon Ahn
, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3): 116-127 (2011) - [j11]Xinwen Zhang, Anugeetha Kunjithapatham, Sangoh Jeong, Simon Gibbs:
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. Mob. Networks Appl. 16(3): 270-284 (2011) - [j10]Min Xu, Duminda Wijesekera, Xinwen Zhang:
Runtime Administration of an RBAC Profile for XACML. IEEE Trans. Serv. Comput. 4(4): 286-299 (2011) - [c68]Ravishankar Ravindran, Guoqiang Wang, Xinwen Zhang:
Towards Secure Mobile Virtual Group in information-centric network. IEEE ANTS 2011: 1-3 - [c67]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the trust of internet routing with lightweight route attestation. AsiaCCS 2011: 92-101 - [c66]Xiaoxin Wu, Lei Xu, Xinwen Zhang:
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. CCS 2011: 869-872 - [c65]Xinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, Guangyu Shi, Guoqiang Wang:
Towards name-based trust and security for content-centric network. ICNP 2011: 1-6 - [c64]Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali:
xDAuth: a scalable and lightweight framework for cross domain access control and delegation. SACMAT 2011: 31-40 - [c63]Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao
:
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. SecureComm 2011: 491-500 - [c62]Katharine Chang, Xinwen Zhang, Guoqiang Wang, Kang G. Shin:
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. SocialCom/PASSAT 2011: 1020-1025 - [c61]Lei Liu, Xinwen Zhang, Songqing Chen:
Botnet with Browser Extensions. SocialCom/PASSAT 2011: 1089-1094 - [c60]Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh:
Taming Information-Stealing Smartphone Applications (on Android). TRUST 2011: 93-107 - [e1]Yan Chen, Shouhuai Xu, Ahmad-Reza Sadeghi, Xinwen Zhang:
Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011. ACM 2011, ISBN 978-1-4503-1001-7 [contents] - [i1]Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang:
Unleashing the Power of Mobile Cloud Computing using ThinkAir. CoRR abs/1105.3232 (2011) - 2010
- [j9]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang:
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing. Concurr. Comput. Pract. Exp. 22(13): 1893-1910 (2010) - [j8]Masoom Alam, Mohammad Nauman
, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010) - [c59]Mohammad Nauman, Sohail Khan
, Xinwen Zhang:
Apex: extending Android permission model and enforcement with user-defined runtime constraints. AsiaCCS 2010: 328-332 - [c58]Wenjuan Xu, Gail-Joon Ahn
, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ESORICS 2010: 182-198 - [c57]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. ICICS 2010: 107-125 - [c56]Tamleek Ali, Mohammad Nauman
, Xinwen Zhang:
On Leveraging Stochastic Models for Remote Attestation. INTRUST 2010: 290-301 - [c55]Xinwen Zhang, Won Jong Jeon, Simon Gibbs, Anugeetha Kunjithapatham:
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices. MobiCASE 2010: 373-381 - [c54]Xinwen Zhang, Sangoh Jeong, Anugeetha Kunjithapatham, Simon Gibbs:
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms. MOBILWARE 2010: 161-174 - [c53]Joshua Schiffman, Xinwen Zhang, Simon Gibbs:
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. POLICY 2010: 95-102 - [c52]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan
, Quratulain Alam:
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. SERVICES 2010: 56-63 - [c51]Dijiang Huang
, Xinwen Zhang, Myong H. Kang, Jim Luo:
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication. SOSE 2010: 27-34 - [c50]Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao:
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization. SRDS 2010: 72-81 - [c49]Mohammad Nauman
, Sohail Khan
, Xinwen Zhang, Jean-Pierre Seifert:
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. TRUST 2010: 1-15 - [c48]Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu:
pBMDS: a behavior-based malware detection system for cellphone devices. WISEC 2010: 37-48
2000 – 2009
- 2009
- [j7]Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu:
Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5): 260-275 (2009) - [c47]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Exploitation and threat analysis of open mobile devices. ANCS 2009: 20-29 - [c46]Onur Aciiçmez, Jean-Pierre Seifert, Xinwen Zhang:
A Secure DVB Set-Top Box via Trusting Computing Technologies. CCNC 2009: 1-8 - [c45]Xinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, Sangoh Jeong:
Securing elastic applications on mobile devices for cloud computing. CCSW 2009: 127-134 - [c44]Basel Katt, Michael Hafner, Xinwen Zhang:
Building a stateful reference monitor with coloured petri nets. CollaborateCom 2009: 1-10 - [c43]Basel Katt, Michael Hafner, Xinwen Zhang:
A usage control policy specification with Petri nets. CollaborateCom 2009: 1-8 - [c42]Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
:
Towards System Integrity Protection with Graph-Based Policy Analysis. DBSec 2009: 65-80 - [c41]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang, Min Li, Chen Yu, Guofu Xiang:
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure. GRID 2009: 113-119 - [c40]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Business Processes. ICWS 2009: 343-350 - [c39]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. MobiSec 2009: 71-82 - [c38]Basel Katt, Xinwen Zhang, Michael Hafner:
Towards a Usage Control Policy Specification with Petri Nets. OTM Conferences (2) 2009: 905-912 - [c37]Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray:
Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 - [c36]Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. RAID 2009: 244-264 - [c35]Jing Jin, Gail-Joon Ahn
, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for sharing electronic health records. SACMAT 2009: 125-134 - [c34]Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu:
Designing System-Level Defenses against Cellphone Malware. SRDS 2009: 83-90 - [c33]Mohammad Nauman
, Masoom Alam, Xinwen Zhang, Tamleek Ali:
Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80 - 2008
- [j6]Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): 3:1-3:36 (2008) - [c32]Onur Aciiçmez, Afshin Latifi, Jean-Pierre Seifert, Xinwen Zhang:
A Trusted Mobile Phone Prototype. CCNC 2008: 1208-1209 - [c31]Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. AsiaCCS 2008: 245-248 - [c30]Jing Jin, Gail-Joon Ahn
, Michael J. Covington, Xinwen Zhang:
Access Control Model for Sharing Composite Electronic Health Records. CollaborateCom 2008: 340-354 - [c29]Qi Li, Mingwei Xu, Xinwen Zhang:
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. ICDCS Workshops 2008: 441-446 - [c28]Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. ISCC 2008: 380-385 - [c27]Gail-Joon Ahn
, Wenjuan Xu, Xinwen Zhang:
Systematic Policy Analysis for High-Assurance Services in SELinux. POLICY 2008: 3-10 - [c26]Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132 - [c25]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. SACMAT 2008: 175-184 - [c24]Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu:
Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 - [c23]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali:
Behavioral attestation for web services (BA4WS). SWS 2008: 21-28 - 2007
- [c22]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
A trusted mobile phone reference architecturevia secure kernel. STC 2007: 7-14 - [c21]Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control. AsiaCCS 2007: 117-126 - [c20]Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin:
Towards a Times-Based Usage Control Model. DBSec 2007: 227-242 - [c19]Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang:
A Model-Driven Framework for Trusted Computing Based Systems. EDOC 2007: 75-86 - [c18]Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu:
Flexible Authorization with Decentralized Access Control Model for Grid Computing. HASE 2007: 156-165 - [c17]Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 - [c16]Berthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang:
A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25 - 2006
- [j5]Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) - [j4]Sejong Oh, Ravi S. Sandhu, Xinwen Zhang:
An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) - [c15]Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang:
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. ANCS 2006: 173-182 - [c14]Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang:
Secure information sharing enabled by Trusted Computing and PEI models. AsiaCCS 2006: 2-12 - [c13]