2009 | ||
---|---|---|
69 | EE | Tiancheng Li, Ninghui Li, Jian Zhang: Modeling and Integrating Background Knowledge in Data Anonymization. ICDE 2009: 6-17 |
2008 | ||
68 | Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008 | |
67 | EE | Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang: Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191 |
66 | EE | Qihua Wang, Ninghui Li, Hong Chen: On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332 |
65 | EE | Tiancheng Li, Ninghui Li: Injector: Mining Background Knowledge for Data Anonymization. ICDE 2008: 446-455 |
64 | EE | Ninghui Li: How to make Discretionary Access Control secure against trojan horses. IPDPS 2008: 1-3 |
63 | EE | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 |
62 | EE | Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112 |
61 | EE | Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30 |
60 | EE | Tiancheng Li, Ninghui Li: Towards optimal k-anonymization. Data Knowl. Eng. 65(1): 22-39 (2008) |
59 | EE | S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
58 | EE | Ninghui Li, Qihua Wang: Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): (2008) |
57 | EE | Rui Xue, Ninghui Li, Jiangtao Li: Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008) |
56 | EE | Ji-Won Byun, Ninghui Li: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4): 603-619 (2008) |
2007 | ||
55 | EE | Jiangtao Li, Ninghui Li, Rui Xue: Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269 |
54 | EE | Ninghui Li, Ziqing Mao: Administration in role-based access control. ASIACCS 2007: 127-138 |
53 | EE | Qihua Wang, Ninghui Li: Direct static enforcement of high-level security policies. ASIACCS 2007: 214-225 |
52 | EE | Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 |
51 | EE | Qihua Wang, Ninghui Li: Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105 |
50 | EE | Ian Molloy, Jiangtao Li, Ninghui Li: Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223 |
49 | EE | Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE 2007: 106-115 |
48 | EE | Ninghui Li, Ziqing Mao, Hong Chen: Usable Mandatory Integrity Protection for Operating Systems. IEEE Symposium on Security and Privacy 2007: 164-178 |
47 | EE | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 |
46 | EE | Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri: On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
45 | EE | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) |
44 | EE | Mahesh V. Tripunitara, Ninghui Li: A theory for comparing the expressive power of access control models. Journal of Computer Security 15(2): 231-272 (2007) |
2006 | ||
43 | Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006 | |
42 | EE | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang: Resiliency policies in access control. ACM Conference on Computer and Communications Security 2006: 113-123 |
41 | EE | Ninghui Li, Qihua Wang: Beyond separation of duty: an algebra for specifying high-level security policies. ACM Conference on Computer and Communications Security 2006: 356-369 |
40 | EE | Tiancheng Li, Ninghui Li: Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. ICDM Workshops 2006: 518-523 |
39 | EE | Jiangtao Li, Ninghui Li: A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138 |
38 | EE | Ziqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 |
37 | EE | Hong Chen, Ninghui Li: Constraint generation for separation of duty. SACMAT 2006: 130-138 |
36 | EE | Xiaoxin Wu, Ninghui Li: Achieving privacy in mesh networks. SASN 2006: 13-22 |
35 | EE | Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li: Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 |
34 | EE | William H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) |
33 | EE | Ninghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006) |
32 | EE | Jiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006) |
31 | EE | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) |
2005 | ||
30 | EE | Jiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57 |
29 | EE | Jiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317 |
28 | EE | Elisa Bertino, Ji-Won Byun, Ninghui Li: Privacy-Preserving Database Systems. FOSAD 2005: 178-206 |
27 | EE | Ninghui Li, Mahesh V. Tripunitara: On Safety in Discretionary Access Control. IEEE Symposium on Security and Privacy 2005: 96-109 |
26 | EE | Jiangtao Li, Ninghui Li: Policy-hiding access control in open environment. PODC 2005: 29-38 |
25 | EE | Ji-Won Byun, Elisa Bertino, Ninghui Li: Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110 |
24 | EE | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005) |
23 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) |
2004 | ||
22 | EE | Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara: On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security 2004: 42-51 |
21 | EE | Mahesh V. Tripunitara, Ninghui Li: Comparing the expressive power of access control models. ACM Conference on Computer and Communications Security 2004: 62-71 |
20 | EE | Ninghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271 |
19 | EE | William H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160 |
18 | Cristina Nita-Rotaru, Ninghui Li: A Framework for Role-Based Access Control in Group Communication Systems. ISCA PDCS 2004: 522-529 | |
17 | EE | Ninghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. SACMAT 2004: 126-135 |
16 | EE | Ting Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8 |
2003 | ||
15 | EE | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89- |
14 | EE | Ninghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201- |
13 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139 |
12 | EE | Ninghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73 |
11 | EE | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189 |
10 | EE | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003) |
9 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003) | |
2002 | ||
8 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130 |
7 | EE | William H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103 |
6 | EE | William H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51 |
2001 | ||
5 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165 |
4 | EE | Ninghui Li, Joan Feigenbaum: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Financial Cryptography 2001: 157-168 |
2000 | ||
3 | EE | Ninghui Li: Local Names in SPKI/SDSI. CSFW 2000: 2-15 |
2 | EE | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum: A Practically Implementable and Tractable Delegation Logic. IEEE Symposium on Security and Privacy 2000: 27-42 |
1999 | ||
1 | EE | Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof: A Logic-based Knowledge Representation for Authorization with Delegation. CSFW 1999: 162-174 |