dblp.uni-trier.dewww.uni-trier.de

Ninghui Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
69EETiancheng Li, Ninghui Li, Jian Zhang: Modeling and Integrating Background Knowledge in Data Anonymization. ICDE 2009: 6-17
2008
68 Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008
67EEHong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang: Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191
66EEQihua Wang, Ninghui Li, Hong Chen: On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332
65EETiancheng Li, Ninghui Li: Injector: Mining Background Knowledge for Data Anonymization. ICDE 2008: 446-455
64EENinghui Li: How to make Discretionary Access Control secure against trojan horses. IPDPS 2008: 1-3
63EEPrathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240
62EEDan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112
61EEIan Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30
60EETiancheng Li, Ninghui Li: Towards optimal k-anonymization. Data Knowl. Eng. 65(1): 22-39 (2008)
59EES. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008)
58EENinghui Li, Qihua Wang: Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): (2008)
57EERui Xue, Ninghui Li, Jiangtao Li: Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008)
56EEJi-Won Byun, Ninghui Li: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4): 603-619 (2008)
2007
55EEJiangtao Li, Ninghui Li, Rui Xue: Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269
54EENinghui Li, Ziqing Mao: Administration in role-based access control. ASIACCS 2007: 127-138
53EEQihua Wang, Ninghui Li: Direct static enforcement of high-level security policies. ASIACCS 2007: 214-225
52EEJi-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200
51EEQihua Wang, Ninghui Li: Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105
50EEIan Molloy, Jiangtao Li, Ninghui Li: Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223
49EENinghui Li, Tiancheng Li, Suresh Venkatasubramanian: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE 2007: 106-115
48EENinghui Li, Ziqing Mao, Hong Chen: Usable Mandatory Integrity Protection for Operating Systems. IEEE Symposium on Security and Privacy 2007: 164-178
47EEQihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566
46EENinghui Li, Mahesh V. Tripunitara, Ziad Bizri: On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
45EEAnnie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007)
44EEMahesh V. Tripunitara, Ninghui Li: A theory for comparing the expressive power of access control models. Journal of Computer Security 15(2): 231-272 (2007)
2006
43 Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006
42EENinghui Li, Mahesh V. Tripunitara, Qihua Wang: Resiliency policies in access control. ACM Conference on Computer and Communications Security 2006: 113-123
41EENinghui Li, Qihua Wang: Beyond separation of duty: an algebra for specifying high-level security policies. ACM Conference on Computer and Communications Security 2006: 356-369
40EETiancheng Li, Ninghui Li: Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. ICDM Workshops 2006: 518-523
39EEJiangtao Li, Ninghui Li: A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138
38EEZiqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173
37EEHong Chen, Ninghui Li: Constraint generation for separation of duty. SACMAT 2006: 130-138
36EEXiaoxin Wu, Ninghui Li: Achieving privacy in mesh networks. SASN 2006: 13-22
35EEJi-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li: Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63
34EEWilliam H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006)
33EENinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006)
32EEJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006)
31EENinghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006)
2005
30EEJiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57
29EEJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317
28EEElisa Bertino, Ji-Won Byun, Ninghui Li: Privacy-Preserving Database Systems. FOSAD 2005: 178-206
27EENinghui Li, Mahesh V. Tripunitara: On Safety in Discretionary Access Control. IEEE Symposium on Security and Privacy 2005: 96-109
26EEJiangtao Li, Ninghui Li: Policy-hiding access control in open environment. PODC 2005: 29-38
25EEJi-Won Byun, Elisa Bertino, Ninghui Li: Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110
24EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
23EENinghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005)
2004
22EENinghui Li, Ziad Bizri, Mahesh V. Tripunitara: On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security 2004: 42-51
21EEMahesh V. Tripunitara, Ninghui Li: Comparing the expressive power of access control models. ACM Conference on Computer and Communications Security 2004: 62-71
20EENinghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271
19EEWilliam H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160
18 Cristina Nita-Rotaru, Ninghui Li: A Framework for Role-Based Access Control in Group Communication Systems. ISCA PDCS 2004: 522-529
17EENinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. SACMAT 2004: 126-135
16EETing Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8
2003
15EENinghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89-
14EENinghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201-
13EENinghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139
12EENinghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73
11EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189
10EENinghui Li, Benjamin N. Grosof, Joan Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003)
9 Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003)
2002
8EENinghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130
7EEWilliam H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103
6EEWilliam H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51
2001
5EENinghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165
4EENinghui Li, Joan Feigenbaum: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Financial Cryptography 2001: 157-168
2000
3EENinghui Li: Local Names in SPKI/SDSI. CSFW 2000: 2-15
2EENinghui Li, Benjamin N. Grosof, Joan Feigenbaum: A Practically Implementable and Tractable Delegation Logic. IEEE Symposium on Security and Privacy 2000: 27-42
1999
1EENinghui Li, Joan Feigenbaum, Benjamin N. Grosof: A Logic-based Knowledge Representation for Authorization with Delegation. CSFW 1999: 162-174

Coauthor Index

1Annie I. Antón [16] [45]
2Elisa Bertino [25] [28] [35] [45] [47] [52] [61] [62] [63]
3Ziad Bizri [22] [46]
4Dan Boneh [11] [24]
5Ji-Won Byun [25] [28] [35] [47] [52] [56]
6Seraphin B. Calo [61]
7Hong Chen [37] [48] [61] [66] [67]
8Wenliang Du [11] [24]
9Joan Feigenbaum [1] [2] [4] [10]
10Benjamin N. Grosof [1] [2] [10]
11Windsor W. Hsu [67]
12Keith Irwin [47]
13S. Jha [59]
14Ashish Kamra [52]
15Jiangtao Li [26] [29] [30] [32] [39] [50] [55] [57]
16Tiancheng Li [40] [49] [60] [61] [65] [69]
17Dan Lin [62] [63]
18Jorge Lobo [47] [61] [62] [63]
19Xiaonan Ma [67]
20Ziqing Mao [38] [48] [54]
21John C. Mitchell [5] [8] [9] [12] [13] [14] [15] [20] [23] [31]
22Ian Molloy [50] [61]
23Peng Ning [43]
24Cristina Nita-Rotaru [18]
25Sihan Qing [43]
26Prathima Rao [62] [63]
27Indrakshi Ray [68]
28Yonglak Sohn [35]
29Derrick Tong [20]
30Mahesh V. Tripunitara [17] [21] [22] [27] [33] [42] [44] [46] [59]
31Suresh Venkatasubramanian [49]
32Qihua Wang [41] [42] [47] [51] [53] [58] [59] [61] [66] [67]
33William H. Winsborough [5] [6] [7] [8] [9] [13] [19] [23] [30] [34] [38] [59]
34Xiaoxin Wu [36]
35Rui Xue [55] [57]
36Ting Yu [16] [45] [47]
37Jian Zhang [69]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)