2009 |
69 | EE | Tiancheng Li,
Ninghui Li,
Jian Zhang:
Modeling and Integrating Background Knowledge in Data Anonymization.
ICDE 2009: 6-17 |
2008 |
68 | | Indrakshi Ray,
Ninghui Li:
SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings
ACM 2008 |
67 | EE | Hong Chen,
Xiaonan Ma,
Windsor W. Hsu,
Ninghui Li,
Qihua Wang:
Access Control Friendly Query Verification for Outsourced Data Publishing.
ESORICS 2008: 177-191 |
66 | EE | Qihua Wang,
Ninghui Li,
Hong Chen:
On the Security of Delegation in Access Control Systems.
ESORICS 2008: 317-332 |
65 | EE | Tiancheng Li,
Ninghui Li:
Injector: Mining Background Knowledge for Data Anonymization.
ICDE 2008: 446-455 |
64 | EE | Ninghui Li:
How to make Discretionary Access Control secure against trojan horses.
IPDPS 2008: 1-3 |
63 | EE | Prathima Rao,
Dan Lin,
Elisa Bertino,
Ninghui Li,
Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management.
POLICY 2008: 238-240 |
62 | EE | Dan Lin,
Prathima Rao,
Elisa Bertino,
Ninghui Li,
Jorge Lobo:
Policy decomposition for collaborative access control.
SACMAT 2008: 103-112 |
61 | EE | Ian Molloy,
Hong Chen,
Tiancheng Li,
Qihua Wang,
Ninghui Li,
Elisa Bertino,
Seraphin B. Calo,
Jorge Lobo:
Mining roles with semantic meanings.
SACMAT 2008: 21-30 |
60 | EE | Tiancheng Li,
Ninghui Li:
Towards optimal k-anonymization.
Data Knowl. Eng. 65(1): 22-39 (2008) |
59 | EE | S. Jha,
Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang,
William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
58 | EE | Ninghui Li,
Qihua Wang:
Beyond separation of duty: An algebra for specifying high-level security policies.
J. ACM 55(3): (2008) |
57 | EE | Rui Xue,
Ninghui Li,
Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets.
J. Comput. Sci. Technol. 23(2): 166-175 (2008) |
56 | EE | Ji-Won Byun,
Ninghui Li:
Purpose based access control for privacy protection in relational database systems.
VLDB J. 17(4): 603-619 (2008) |
2007 |
55 | EE | Jiangtao Li,
Ninghui Li,
Rui Xue:
Universal Accumulators with Efficient Nonmembership Proofs.
ACNS 2007: 253-269 |
54 | EE | Ninghui Li,
Ziqing Mao:
Administration in role-based access control.
ASIACCS 2007: 127-138 |
53 | EE | Qihua Wang,
Ninghui Li:
Direct static enforcement of high-level security policies.
ASIACCS 2007: 214-225 |
52 | EE | Ji-Won Byun,
Ashish Kamra,
Elisa Bertino,
Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques.
DASFAA 2007: 188-200 |
51 | EE | Qihua Wang,
Ninghui Li:
Satisfiability and Resiliency in Workflow Systems.
ESORICS 2007: 90-105 |
50 | EE | Ian Molloy,
Jiangtao Li,
Ninghui Li:
Dynamic Virtual Credit Card Numbers.
Financial Cryptography 2007: 208-223 |
49 | EE | Ninghui Li,
Tiancheng Li,
Suresh Venkatasubramanian:
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity.
ICDE 2007: 106-115 |
48 | EE | Ninghui Li,
Ziqing Mao,
Hong Chen:
Usable Mandatory Integrity Protection for Operating Systems.
IEEE Symposium on Security and Privacy 2007: 164-178 |
47 | EE | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 |
46 | EE | Ninghui Li,
Mahesh V. Tripunitara,
Ziad Bizri:
On mutually exclusive roles and separation-of-duty.
ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
45 | EE | Annie I. Antón,
Elisa Bertino,
Ninghui Li,
Ting Yu:
A roadmap for comprehensive online privacy policy management.
Commun. ACM 50(7): 109-116 (2007) |
44 | EE | Mahesh V. Tripunitara,
Ninghui Li:
A theory for comparing the expressive power of access control models.
Journal of Computer Security 15(2): 231-272 (2007) |
2006 |
43 | | Peng Ning,
Sihan Qing,
Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Springer 2006 |
42 | EE | Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang:
Resiliency policies in access control.
ACM Conference on Computer and Communications Security 2006: 113-123 |
41 | EE | Ninghui Li,
Qihua Wang:
Beyond separation of duty: an algebra for specifying high-level security policies.
ACM Conference on Computer and Communications Security 2006: 356-369 |
40 | EE | Tiancheng Li,
Ninghui Li:
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching.
ICDM Workshops 2006: 518-523 |
39 | EE | Jiangtao Li,
Ninghui Li:
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
ICICS 2006: 122-138 |
38 | EE | Ziqing Mao,
Ninghui Li,
William H. Winsborough:
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
ICICS 2006: 159-173 |
37 | EE | Hong Chen,
Ninghui Li:
Constraint generation for separation of duty.
SACMAT 2006: 130-138 |
36 | EE | Xiaoxin Wu,
Ninghui Li:
Achieving privacy in mesh networks.
SASN 2006: 13-22 |
35 | EE | Ji-Won Byun,
Yonglak Sohn,
Elisa Bertino,
Ninghui Li:
Secure Anonymization for Incremental Datasets.
Secure Data Management 2006: 48-63 |
34 | EE | William H. Winsborough,
Ninghui Li:
Safety in automated trust negotiation.
ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) |
33 | EE | Ninghui Li,
Mahesh V. Tripunitara:
Security analysis in role-based access control.
ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006) |
32 | EE | Jiangtao Li,
Ninghui Li:
OACerts: Oblivious Attribute Certificates.
IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006) |
31 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI using first-order logic.
Int. J. Inf. Sec. 5(1): 48-64 (2006) |
2005 |
30 | EE | Jiangtao Li,
Ninghui Li,
William H. Winsborough:
Automated trust negotiation using cryptographic credentials.
ACM Conference on Computer and Communications Security 2005: 46-57 |
29 | EE | Jiangtao Li,
Ninghui Li:
OACerts: Oblivious Attribute Certificates.
ACNS 2005: 301-317 |
28 | EE | Elisa Bertino,
Ji-Won Byun,
Ninghui Li:
Privacy-Preserving Database Systems.
FOSAD 2005: 178-206 |
27 | EE | Ninghui Li,
Mahesh V. Tripunitara:
On Safety in Discretionary Access Control.
IEEE Symposium on Security and Privacy 2005: 96-109 |
26 | EE | Jiangtao Li,
Ninghui Li:
Policy-hiding access control in open environment.
PODC 2005: 29-38 |
25 | EE | Ji-Won Byun,
Elisa Bertino,
Ninghui Li:
Purpose based access control of complex data for privacy protection.
SACMAT 2005: 102-110 |
24 | EE | Ninghui Li,
Wenliang Du,
Dan Boneh:
Oblivious signature-based envelope.
Distributed Computing 17(4): 293-302 (2005) |
23 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management.
J. ACM 52(3): 474-514 (2005) |
2004 |
22 | EE | Ninghui Li,
Ziad Bizri,
Mahesh V. Tripunitara:
On mutually-exclusive roles and separation of duty.
ACM Conference on Computer and Communications Security 2004: 42-51 |
21 | EE | Mahesh V. Tripunitara,
Ninghui Li:
Comparing the expressive power of access control models.
ACM Conference on Computer and Communications Security 2004: 62-71 |
20 | EE | Ninghui Li,
John C. Mitchell,
Derrick Tong:
Securing Java RMI-Based Distributed Applications.
ACSAC 2004: 262-271 |
19 | EE | William H. Winsborough,
Ninghui Li:
Safety in Automated Trust Negotiation.
IEEE Symposium on Security and Privacy 2004: 147-160 |
18 | | Cristina Nita-Rotaru,
Ninghui Li:
A Framework for Role-Based Access Control in Group Communication Systems.
ISCA PDCS 2004: 522-529 |
17 | EE | Ninghui Li,
Mahesh V. Tripunitara:
Security analysis in role-based access control.
SACMAT 2004: 126-135 |
16 | EE | Ting Yu,
Ninghui Li,
Annie I. Antón:
A formal semantics for P3P.
SWS 2004: 1-8 |
2003 |
15 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic.
CSFW 2003: 89- |
14 | EE | Ninghui Li,
John C. Mitchell:
A Role-based Trust-management Framework.
DISCEX (1) 2003: 201- |
13 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
IEEE Symposium on Security and Privacy 2003: 123-139 |
12 | EE | Ninghui Li,
John C. Mitchell:
DATALOG with Constraints: A Foundation for Trust Management Languages.
PADL 2003: 58-73 |
11 | EE | Ninghui Li,
Wenliang Du,
Dan Boneh:
Oblivious signature-based envelope.
PODC 2003: 182-189 |
10 | EE | Ninghui Li,
Benjamin N. Grosof,
Joan Feigenbaum:
Delegation logic: A logic-based approach to distributed authorization.
ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003) |
9 | | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security 11(1): 35-86 (2003) |
2002 |
8 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Design of a Role-Based Trust-Management Framework.
IEEE Symposium on Security and Privacy 2002: 114-130 |
7 | EE | William H. Winsborough,
Ninghui Li:
Towards Practical Automated Trust Negotiation.
POLICY 2002: 92-103 |
6 | EE | William H. Winsborough,
Ninghui Li:
Protecting sensitive attributes in automated trust negotiation.
WPES 2002: 41-51 |
2001 |
5 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract.
ACM Conference on Computer and Communications Security 2001: 156-165 |
4 | EE | Ninghui Li,
Joan Feigenbaum:
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.
Financial Cryptography 2001: 157-168 |
2000 |
3 | EE | Ninghui Li:
Local Names in SPKI/SDSI.
CSFW 2000: 2-15 |
2 | EE | Ninghui Li,
Benjamin N. Grosof,
Joan Feigenbaum:
A Practically Implementable and Tractable Delegation Logic.
IEEE Symposium on Security and Privacy 2000: 27-42 |
1999 |
1 | EE | Ninghui Li,
Joan Feigenbaum,
Benjamin N. Grosof:
A Logic-based Knowledge Representation for Authorization with Delegation.
CSFW 1999: 162-174 |