dblp.uni-trier.dewww.uni-trier.de

Yeping He

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
15EEXinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang: Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. ISPEC 2009: 83-92
2008
14EELingli Deng, Yeping He, Ziyao Xu: Enforcing Separation of Duty in Ad Hoc Collaboration. ICYCS 2008: 1545-1552
13EELingli Deng, Yeping He, Ziyao Xu: Service Authenticity in P2P File-Sharing. ICYCS 2008: 2246-2253
12EELingli Deng, Yeping He, Ziyao Xu: Separation of Duty in Trust-Based Collaboration. Inscrypt 2008: 370-388
11EEZiyao Xu, Yeping He, Lingli Deng: An Integrity Assurance Mechanism for Run-Time Programs. Inscrypt 2008: 389-405
10EELingli Deng, Yeping He, Ziyao Xu: Trusted Reputation Management Service for Peer-to-Peer Collaboration. OTM Conferences (2) 2008: 1069-1086
2007
9EEZhiguo Shi, Yeping He, Xiaoyong Huai, Hong Zhang: Identity Anonymity for Grid Computing Coordination based on Trusted Computing. GCC 2007: 403-410
8EEZiyao Xu, Yeping He, Lingli Deng: A Multilevel Reputation System for Peer-to-Peer Networks. GCC 2007: 67-74
7EEHong Zhang, Yeping He, Zhiguo Shi: A formal model for access control with supporting spatial context. Science in China Series F: Information Sciences 50(3): 419-439 (2007)
2006
6EELingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan: An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). ICICS 2006: 322-331
5EEHong Zhang, Yeping He, Zhiguo Shi: Spatial Context in Role-Based Access Control. ICISC 2006: 166-178
4EEChunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou: A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. Inscrypt 2006: 196-210
3EEQingguang Ji, Sihan Qing, Yeping He: A formal model for integrity protection based on DTE technique. Science in China Series F: Information Sciences 49(5): 545-565 (2006)
2005
2EEZhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He: A Formal Description of SECIMOS Operating System. MMM-ACNS 2005: 286-297
2001
1EEYeping He, Sihan Qing: Square Attack on Reduced Camellia Cipher. ICICS 2001: 238-245

Coauthor Index

1Lingli Deng [6] [8] [10] [11] [12] [13] [14]
2Jianbo He [4]
3Xiaoyong Huai [9]
4Qingguang Ji [3]
5Li Jiang [2]
6Bin Liang [2]
7Hongliang Liang [15]
8Sihan Qing [1] [3]
9Wenchang Shi [2]
10Zhiguo Shi [5] [7] [9]
11Xinsong Wu [15]
12Ziyao Xu [6] [8] [10] [11] [12] [13] [14]
13Chunyang Yuan [4] [6]
14Hong Zhang [5] [7] [9]
15Zhouyi Zhou [2] [4] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)